Skip to main content
Log in

Distribution of random session key based on key-insulated public-key cryptosystems

  • Cryptography
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

Based on the characteristic of key-insulated public-key cryptosystem, we propose a distributed random session keys distribution protocol without a key distribution center. The session key is generated by different user and only used one time. So the key is one-time key. In addition, the user who generates the next one-time key, is random selected by the current session key. In the protocol of this paper, the characteristic of time in the key-insulated public-key, a distributed protocol, translates into the characteristic of space which every point has different secret key in the different period. At the same time, the system is fit for key management in Ad Hoc, and is a new scheme of key management in Ad Hoc.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Dodis Y, Katz J, Xu S,et al. Key-Insulated Public-Key Cryptosystems.http://citeseer.nj.nec.com/, June 2002.

  2. Morillo P. Some Trends for Future Research in Distributed Cryptography.http://wwwmat.upc.es/grup_de_cripto/, June 2002.

  3. Zhou L, Haas Z J. Securing Ad Hoc Networks,IEEE Networks, 1999,13(6): 24–30.

    Article  Google Scholar 

  4. Boneh D, Franklin M. Identity Based Encryption Scheme from the Weil Pairing.Proceedings of Crypto '01,LNCS 2139. Berlin: Springer-Verlag, 2001, 213–229.

    Google Scholar 

  5. Yi S, Kravets R.Composite Key Management for Ad Hoc Networks, Report No. UIUCDCS-R-2003-2392.http:// www.cs.uiuc.edu/Dienst/Repository/2.0/Body/ncstrl.uiuc_cs/UIUCDCS-R-2003-2392/pdf, Dec 2003.

  6. Yan Z. Security in Ad Hoc Networks.http://citeseer.nj. nec.com/536945.html, March 2002.

  7. Naor M, Pinkas B, Reingold O. Distributed Pseudo-Random Function and KDCs.Advances in Cryptology: Eurocrypt' 99, LNCS 1592. Berlin: Springer-Verlag, 1999. 327–346.

    Google Scholar 

  8. Needham R, Schroeder M. Using Encryption for Authentication in Large Networks of Computers.Communications of the ACM, 1978,21(12): 993–999.

    Article  MATH  Google Scholar 

  9. Bellare M, Rogaway P. Provably Secure Session Key Distribution-The Three Party Case. 27th ACM Symposium on the Theory of Computing. New York: ACM Press, 1995, 662–671.

    Google Scholar 

  10. Daza V, Herranz J, Padr C,et al. A Distributed and Computationally Secure Key Distribution Scheme.5th In formation Security Conference, ISC' 02, LNCS 2433. Berlin: Springer-Verlag, 2002, 342–356.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhu Yue-fei.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (90204015, 60473021) and the Basic Research Program of China (973 Program) (G1999035804)

Biography: Lu Hai-jun (1968-), male, Ph. D candidate, research direction: the theory of information security and cryptography.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hai-jun, L., Yun-xue, S. & Yue-fei, Z. Distribution of random session key based on key-insulated public-key cryptosystems. Wuhan Univ. J. Nat. Sci. 10, 251–254 (2005). https://doi.org/10.1007/BF02828662

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02828662

Key words

CLC number

Navigation