Advertisement

Authentication of Real-Time Communication System Using KIS Scheme

  • Binayak Kar
  • Eric Hsiao-kuang Wu
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 260)

Abstract

In global communication environment, signature computation will be frequently performed on a relatively insecure device that cannot be trusted all times to maintain the secrecy of the private key. To deal with this, Dodis et al. [1] proposed a strong key-insulated signature schemes whose goal is to minimize the damage caused by secret-key exposures. This environment will become more important when we focus on real time communication like telephony, TV shopping, electronic voting etc. Any flaws in the authentication system cause a critical damage to the real time environment. Considering this scenario we proposed a KIS scheme based on elliptic curve cryptography, which minimizes the damage of key exposer. Its security is based on elliptic curve discrete logarithm problem (ECDLP) assumption, and efficient in terms of computational cost and signature size.

Notes

Acknowledgments

The paper is supported partially by the “Cross-platform smart phone-enable stroke prevention and rehabilitation health system” project and partially by the NSC-101-2811-E-008-013 project.

References

  1. 1.
    Dodis Y, Katz J, Xu S, Yung M (2003) Strong key-insulated signature scheme. In: Public Key Cryptography PCK, pp 130–144Google Scholar
  2. 2.
    Kopetz H (2011) Real-time system: design principles for distributed embedded applications, vol 25. SpringerGoogle Scholar
  3. 3.
    Lin L, Lin P (2007) Orchestration in web services and real-time communications. Commun Mag, IEEE 45(7):44–50CrossRefGoogle Scholar
  4. 4.
    Barker E, Barker W, Burr W, Polk W, Smid M (2011) Recommendation for key-management-part 1: general (revision 3). NIST Spec Publ 800:57Google Scholar
  5. 5.
    Dodis Y, Katz J, Xu S, Yung M (2002) Key-insulated public key cryptosystems. In: Advances in cryptology Eurocrypt, Springer pp 65–82Google Scholar
  6. 6.
    Gonzalez-Deleito N, Markoitch O, DallOlio E (2004) A new key-insulated signature scheme. In: Information and communication security, pp 9–12Google Scholar
  7. 7.
    Ohtake G, Ogawa K (2012) Application authentication for hybrid services of broadcasting and communication networks. In: Information security applications, pp 171–186Google Scholar
  8. 8.
    Ohtake G, Hanaoka G, Ogawa K (2010) Efficient provider authentication for bidirectional broadcasting services. IEICE Trans Fundam Electron, Commun Comput Sci 93(6):1039–1051Google Scholar
  9. 9.
    Matsuda T, Hanaoka G, Ogawa K (2007) A practical provider authentication system for bidirectional broadcast service. In: Knowledge based intelligent information and engineering systems. Springer, pp 967–974Google Scholar
  10. 10.
    Ohtake G, Hanaoka G, Ogawa K (2008) An efficient strong key-insulated signature scheme and its application. In: Public key infrastructure, PKI, pp 150–165Google Scholar
  11. 11.
    Weng J, Liu S, Chen K, Li X (2006) Identity based key-insulated signature with secure key-updates. In: Information security and cryptology. Springer, pp 13–26Google Scholar
  12. 12.
    Weng J, Liu S, Chen K, Ma C (2007) Identity based key-insulated signature without random oracles. In: Computational intelligence and security, pp 470–480Google Scholar
  13. 13.
    Du H, Li J, Zhang Y, Li T, Zhang Y (2012) Certificate based key-insulated signature. In: Data and knowledge engineering. Springer, pp 206–220Google Scholar
  14. 14.
    Wu TY, Tseng YM, Yu CW (2012) Id based key-insulated signature scheme with batch verifications and its novel applications. In: Int J Innovative Comput, Inf Control 8(7(A)):4797–4810Google Scholar
  15. 15.
    Nickalls R (1993) A new approach to solving the cubic: Cardan’s solution revealed. In: The mathematical Gazette. pp 354–359Google Scholar
  16. 16.
    Stallings W (2003) Cryptography and network security, principles and practices. Practice HallGoogle Scholar
  17. 17.
    Koblitz N (1987) Elliptic curve cryptosystem. Math Comput 48(177):203–209MathSciNetCrossRefMATHGoogle Scholar
  18. 18.
    Remarks on the security of elliptic curve cryptosystem: a Certicom white paper, CTEC Cryptosystem, updated July (2000). http://www.certicom.com/

Copyright information

© Springer Science+Business Media Dordrecht 2014

Authors and Affiliations

  1. 1.Department of Computer Science and Information EngineeringNational Central UniversityJhongliTaiwan

Personalised recommendations