Key Management Scheme Based on(t,n) Threshold Cryptosystem
This paper analyzed the security threats and systemflaws of present key management schemes.Combining(t,n)threshold cryptography and key management,wepresent a threshold key management scheme based onECC( Elliptic Curve Cryptosystem ).By utilizingsecret key sharing and probabilistic encryptionalgorithm in key management,the scheme achievesthreshold management of symmetric key and publickey certificate,avoids the relevance between differentcertificates generated by the same CA(CertificateAgency)or KDC(Key Distribution Center).Thescheme avoids the misuse of certificate generation andanonymity of CA/KDC members,effectively preventscoalition attack,intruder-in-middle attack andgeneralized certificate forgery.Further analyses andcomparison with other key management schemes alsojustify the schemes brevity,security,high efficiency,and thus considerable improvement on systemefficiency regarding software and hardwareapplication.Therefore,the scheme is most applicableto such circumstances as with restricted computationability,integrated space and limited bandwidth yetrequiring for high-speed operation.
Xuanwu Zhou Ping Wei
Key Lab of Network & Information Security of the APF,Engineering College of the APF,Xian 710086,Chi Key Lab of Network & Information Security of the APF,Engineering College of the APF,Xian 710086,Chi
国际会议
厦门
英文
1288-1293
2008-11-17(万方平台首次上网日期,不代表论文的发表时间)