Paper Title:
Scheme Optimization in Key Management with Cryptograph Methods
  Abstract

System optimization for key management is an essential method to facilitate the wide application of key management in cryptography protocols. In the paper, we presented a threshold recovering algorithm for key distribution protocols. In the algorithm, the private keys from KGC (Key Generating Center) is encrypted and then shared among the applier members. The attack on the encrypted private keys and the threshold scheme proves computationally infeasible with exponent complexity. Besides, the threshold recovering algorithm is independent of the KGC without leakage of private information of the subgroup; therefore the threshold recovering of private keys renders effective protection for the secrecy of private parameters and applier identity. As to the efficiency of key management algorithms, we presented improved authenticated encryption scheme for key management. In the scheme, the secret transmission of essential parameters is reinforced with integrity and authenticity verification algorithms in an integrated mode; thus greatly improves the efficiency of key management.

  Info
Periodical
Edited by
Qi Luo
Pages
539-545
DOI
10.4028/www.scientific.net/AMM.20-23.539
Citation
X. W. Zhou, "Scheme Optimization in Key Management with Cryptograph Methods ", Applied Mechanics and Materials, Vols. 20-23, pp. 539-545, 2010
Online since
January 2010
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Xuan Wu Zhou
Abstract:Compared with symmetric cryptosystem, asymmetric cryptosystem has much superiority in many application cases. Yet, the computation in a...
505
Authors: Xuan Wu Zhou
Abstract:In the paper, we analyzed optimization algorithms for proxy signature and presented an optimized proxy signature scheme based on discrete...
518
Authors: Xuan Wu Zhou
Abstract:In the paper, we analyzed the system optimization algorithms in e-cash (electronic cash) by improving the efficiency of e-cash for software...
532
Authors: Xuan Wu Zhou
Abstract:As a typical fast public key cryptosystem, HCC (Hyper-elliptic Curves Cryptosystem) provides efficient asymmetric algorithms for cryptography...
546
Authors: Xuan Wu Zhou
Abstract:Public verifiability in signcryption achieves public verification of signature by a trustable third party; it ensures the reliability and...
706