Title :
ID-based secure key generation protocol
Author :
Sharma, Dhruti ; Jinwala, Devesh
Author_Institution :
Inf. Technol. Dept., Sarvajanik Coll. of Eng. & Technol., Surat, India
Abstract :
Identity-based Cryptography (IBC) is an exciting alternative to public-key Cryptography (PKC), as it eliminates the need for certificate that is a major issue in PKC. However, IBC suffers from an additional limitation viz. the key escrow problem - that is - a user´s private key is generated by the central trusted Key Generation Centre (KGC) - that being a single entity, lends itself to the security vulnerabilities in the cryptosystem. One of the prominent solutions proposed as Secure Key Issuing Protocol by Lee. et al. which uses a distributed protocol to generate the private key for user. However, this approach entails significant communications overhead. Hence, in this paper we have proposed an improved Identity based Secure Key Generation Protocol that gives the complete solution of key escrow problem, using clustering based approach. The proposed scheme involves less number of authorities in the computation of the public/private key pair and hence is more efficient. As we further analyze in the paper, our protocol also provides protection against the possible collusion attack in Lee´s protocol. To the best of our knowledge, this is a simple, yet efficient and unique attempt to overcome the key escrow problem in IBCs.
Keywords :
cryptographic protocols; private key cryptography; public key cryptography; IBC; ID-based secure key generation protocol; Lee´s protocol; central trusted KGC; central trusted key generation centre; collusion attack; cryptosystem; distributed protocol; identity-based cryptography; key escrow problem; private key cryptography; private key generation; public-private key pair; secure key issuing protocol; security vulnerability; Encryption; Privacy; Protocols; Public key; Receivers; Bilinear Pairing; Identity Based Cryptography; Key Generation Centre; Key Generation Protocol; Key Privacy Authority; Public Key Cryptography;
Conference_Titel :
Computer and Communication Technology (ICCCT), 2011 2nd International Conference on
Conference_Location :
Allahabad
Print_ISBN :
978-1-4577-1385-9
DOI :
10.1109/ICCCT.2011.6075145