Dynamic Tag Identity-Based Encryption Scheme for Logistic Systems
In recent years, there is an increasing interest in harbor security and safety due to growing threats by international terrorism. There have been many efforts to cope with international terrorism on the harbor and transport. One of these efforts, department of homeland security of USA has been tried to make a CSD (conveyance security device) security standard such as ISO 18185 to achieve secure transport and logistics. However, since the CSD security standard is based on the symmetric key cryptosystem, which requires the centralized key management system, the CSD security is not widely used for logistic security. It is known that current CSD security standard has difficulty in mutual authentication and signature generation/verification. If we use the PKI (Public Key Infrastructure) based public key cryptosystem for CSD security, we can use the authentication and key management capabilities more easily in eSeal and CSD logistics applications. However, the PKI requires high computational cost, communication overhead, and high storage cost. In this reason, we propose a novel public key cryptosystem for logistics security, which is called dynamic tag ID-based encryption scheme. The proposed scheme requires a trusted agency (TA) to reduce the storage and communication overhead. It is more efficient than conventional PKI cryptosystem from the viewpoint of communication cost because proposed scheme communicates only between tags and TA. Also since proposed scheme does not require storage for a certificate, it is more efficient than conventional PKI based cryptosystem from the point of storage usage.
This work was supported by the Grant of the Korean Ministry of Education, Science and Technology (The Regional Core Research Program/Institute of Logistics Information Technology).
- Chien HY, Chen CH (2005) A remote authentication scheme preserving user. IEEE AINA’05 245–248Google Scholar
- Desmedt Y, Quisquater J (1986) Public-key systems based on the difficulty of tampering. CRYPTO ‘86 111–117Google Scholar
- Huhnlein D, Jacobson M, Weber D (2000) Towards practical non-interactive public key cryptosystems using non-maximal imaginary quadratic orders. Sel Areas Crypt 275–287Google Scholar
- Liao I-E, Lee C-C, Hwang M-S (2005) Security enhancement for a dynamic id-based remote user authentication scheme. International conference on next generation web services practices (NWeSP’05), pp 437–440Google Scholar
- Maurer U, Yacobi Y (1991) Non-interactive public-key cryptography. CRYPTO ‘91 498–507Google Scholar
- Shamir A (1984) Identity-based cryptosystems and signature schemes. CRYPTO ‘84 47–53Google Scholar
- Tanaka H (1987) A realization scheme for the identity-based cryptosystem. CRYPTO ‘87 341–349Google Scholar
- Wong KHM, Zheng Y, Cao J, Wang S (2006) A dynamic user authentication scheme for wireless sensor networks. IEEE international conference on sensor networks, Ubiquitous, and Trustworthy Computing (SUTC’06), pp 244–251Google Scholar