Abstract
Based on the characteristic of key-insulated public-key cryptosystem, we propose a distributed random session keys distribution protocol without a key distribution center. The session key is generated by different user and only used one time. So the key is one-time key. In addition, the user who generates the next one-time key, is random selected by the current session key. In the protocol of this paper, the characteristic of time in the key-insulated public-key, a distributed protocol, translates into the characteristic of space which every point has different secret key in the different period. At the same time, the system is fit for key management in Ad Hoc, and is a new scheme of key management in Ad Hoc.
Similar content being viewed by others
References
Dodis Y, Katz J, Xu S,et al. Key-Insulated Public-Key Cryptosystems.http://citeseer.nj.nec.com/, June 2002.
Morillo P. Some Trends for Future Research in Distributed Cryptography.http://wwwmat.upc.es/grup_de_cripto/, June 2002.
Zhou L, Haas Z J. Securing Ad Hoc Networks,IEEE Networks, 1999,13(6): 24–30.
Boneh D, Franklin M. Identity Based Encryption Scheme from the Weil Pairing.Proceedings of Crypto '01,LNCS 2139. Berlin: Springer-Verlag, 2001, 213–229.
Yi S, Kravets R.Composite Key Management for Ad Hoc Networks, Report No. UIUCDCS-R-2003-2392.http:// www.cs.uiuc.edu/Dienst/Repository/2.0/Body/ncstrl.uiuc_cs/UIUCDCS-R-2003-2392/pdf, Dec 2003.
Yan Z. Security in Ad Hoc Networks.http://citeseer.nj. nec.com/536945.html, March 2002.
Naor M, Pinkas B, Reingold O. Distributed Pseudo-Random Function and KDCs.Advances in Cryptology: Eurocrypt' 99, LNCS 1592. Berlin: Springer-Verlag, 1999. 327–346.
Needham R, Schroeder M. Using Encryption for Authentication in Large Networks of Computers.Communications of the ACM, 1978,21(12): 993–999.
Bellare M, Rogaway P. Provably Secure Session Key Distribution-The Three Party Case. 27th ACM Symposium on the Theory of Computing. New York: ACM Press, 1995, 662–671.
Daza V, Herranz J, Padr C,et al. A Distributed and Computationally Secure Key Distribution Scheme.5th In formation Security Conference, ISC' 02, LNCS 2433. Berlin: Springer-Verlag, 2002, 342–356.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Natural Science Foundation of China (90204015, 60473021) and the Basic Research Program of China (973 Program) (G1999035804)
Biography: Lu Hai-jun (1968-), male, Ph. D candidate, research direction: the theory of information security and cryptography.
Rights and permissions
About this article
Cite this article
Hai-jun, L., Yun-xue, S. & Yue-fei, Z. Distribution of random session key based on key-insulated public-key cryptosystems. Wuhan Univ. J. Nat. Sci. 10, 251–254 (2005). https://doi.org/10.1007/BF02828662
Received:
Issue Date:
DOI: https://doi.org/10.1007/BF02828662
Key words
- key-insulated public-key cryptosystem
- onetime key
- distributed cryptography protocol
- distributed characteristic of space and time
- key management of Ad Hoc