会议专题

Key Management Scheme Based on(t,n) Threshold Cryptosystem

This paper analyzed the security threats and systemflaws of present key management schemes.Combining(t,n)threshold cryptography and key management,wepresent a threshold key management scheme based onECC( Elliptic Curve Cryptosystem ).By utilizingsecret key sharing and probabilistic encryptionalgorithm in key management,the scheme achievesthreshold management of symmetric key and publickey certificate,avoids the relevance between differentcertificates generated by the same CA(CertificateAgency)or KDC(Key Distribution Center).Thescheme avoids the misuse of certificate generation andanonymity of CA/KDC members,effectively preventscoalition attack,intruder-in-middle attack andgeneralized certificate forgery.Further analyses andcomparison with other key management schemes alsojustify the schemes brevity,security,high efficiency,and thus considerable improvement on systemefficiency regarding software and hardwareapplication.Therefore,the scheme is most applicableto such circumstances as with restricted computationability,integrated space and limited bandwidth yetrequiring for high-speed operation.

Xuanwu Zhou Ping Wei

Key Lab of Network & Information Security of the APF,Engineering College of the APF,Xian 710086,Chi Key Lab of Network & Information Security of the APF,Engineering College of the APF,Xian 710086,Chi

国际会议

2008 3rd International Conference on Intelligent System and Knowledge Engineering(第三届智能系统与知识工程国际会议)(ISKE 2008)

厦门

英文

1288-1293

2008-11-17(万方平台首次上网日期,不代表论文的发表时间)