• 综合性科技类中文核心期刊
    • 中国科技论文统计源期刊
    • 中国科学引文数据库来源期刊
    • 中国学术期刊文摘数据库(核心版)来源期刊
    • 中国学术期刊综合评价数据库来源期刊
SHI Wei-min. An Improved Scheme of LeeB Secure Key Issuing Protocol[J]. Journal of Beijing University of Technology, 2010, 36(3): 401-404.
Citation: SHI Wei-min. An Improved Scheme of LeeB Secure Key Issuing Protocol[J]. Journal of Beijing University of Technology, 2010, 36(3): 401-404.

An Improved Scheme of LeeB Secure Key Issuing Protocol

More Information
  • Received Date: April 19, 2008
  • Available Online: December 14, 2022
  • To resolve user's key escrow problem of Lee B et al's protocol, this paper presents an improvement by an identity-password pair published for confirming user identity and analyzes its security and efficence.The improved scheme overcomes the disadvantages of LeeB et al.ṥ scheme and save at least 4n pairing and 2n Hash operations.
  • [1]
    SHAMIR A.Identity-based cryptosystem and signature schemes[C]∥Advances in Cryptology 1984.Berlin:Springer-Verlag, 1984:47-53.
    [2]
    PATERSON K G. ID-based signatures from pairings on elliptic curves[J]. Electronics Letters, 2003, 38 (18) : 1025-1026.
    [3]
    BONEHD, FRANKLINM.Identity based encryption from weil pairing[C]∥Advances in Cryptology1984.Berlin:Springer-Verlag, 2001:213-229.
    [4]
    BONEHD, FRANKLI N M.Short signature from weil pairing[C]∥Boyd C Asiacrypt 2001, Berlin:Springer-Verlag, 2001:514-532.
    [5]
    CHEN L, HARRISON K, SOLDERA D, et al.Applications of multiple trust authorities in pairing based cryptosystems[C]∥Proc of Infrastructure Security Conference.Berlin:Springer-Verlag, 2002:260-275.
    [6]
    GENTRY C.Certificate-based encryption and the certificate revocation problem[C]∥Advances in Cryptology-EUROCRYPT2003.Berlin:Springer-Verlag, 2003:272-293.
    [7]
    AL-RIYAMI S, PATERSON K.Certificateless public key cryptography[C]∥Advances in Cryptology-Asiacrypt'2003.Berlin:Springer-Verlag, 2003:452-472.
    [8]
    LEE B, BOYD E, DAESON E, et al.Secure key issuing in ID-based cryptography[C]∥In Proceedings of the SecondAustralian Information Security Workshop-AISW 2004.New Zealand:Australian Computer Society, Inc, 2004:69-74.
  • Related Articles

    [1]ZHOU Dawei, WEI Guoheng, ZHANG Huanguo. Key-management Scheme Based on Public-key Institution to Clustered Wireless Sensor Networks[J]. Journal of Beijing University of Technology, 2016, 42(5): 707-712. DOI: 10.11936/bjutxb2015070081
    [2]CAI Yong-quan, XUE Fei, YANG Yi. Rational Threshold Signature Based on Hierarchical Key[J]. Journal of Beijing University of Technology, 2013, 39(9): 1366-1370.
    [3]YI Xiao-lin, LIU Xu-hui. Synchronized Key Generation Algorithm Based on Spatiotemporal Chaos Synchronization[J]. Journal of Beijing University of Technology, 2013, 39(5): 696-699.
    [4]HAN Lei, LIU Ji-qiang, WEI Xue-ye, HOU Jie. Application Research on Key Management of Ad Hoc Network Based on PTPM[J]. Journal of Beijing University of Technology, 2012, 38(11): 1676-1682.
    [5]ZHOU Yi-hua, LIU Liang. TPM Based Authenticated Key Agreement Protocol With One-way Anonymous[J]. Journal of Beijing University of Technology, 2012, 38(9): 1372-1376.
    [6]SHI Wei-min. Enhanced Identity-based Deniable Authentication Protocol[J]. Journal of Beijing University of Technology, 2011, 37(3): 477-480.
    [7]ZHAN Yang, TIAN Hai-bo, CHEN Xiao-feng, WANG Yu-min. ID-based Chameleon Hash Scheme and Signature Without Key Escrow[J]. Journal of Beijing University of Technology, 2010, 36(5): 685-688.
    [8]FU Ying-fang, HE Jing-sha, LUAN Liang-yu, WANG Rong, LI Guo-rui. A Distributed Key Management Scheme for Wireless Mesh Networks[J]. Journal of Beijing University of Technology, 2009, 35(3): 403-408.
    [9]CAI Yong-quan, WANG Ya-li. Conference Key Agreement Protocol Based on Elliptic Curve[J]. Journal of Beijing University of Technology, 2007, 33(8): 870-873.
    [10]CAI Yong-quan, XIAO Chuang-bo. Security Frame of Private Key Certificate Based on Attribute and Its Realization[J]. Journal of Beijing University of Technology, 2004, 30(1): 68-70.

Catalog

    Article views (8) PDF downloads (7) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return