DocumentCode :
2916829
Title :
Key Management Scheme with Bionic Optimization
Author :
Zhou, Xuanwu
Author_Institution :
Key Lab. of Network & Inf. Security of the Chinese Armed Police Force, Eng. Coll. of the Chinese Armed Police Force, Xi´´an, China
Volume :
3
fYear :
2009
fDate :
21-22 Nov. 2009
Firstpage :
670
Lastpage :
673
Abstract :
Key management is essential to the security of a cryptosystem. In the paper, we introduce bionic evolution into the designing of key management schemes, and present an improved key management scheme based on bionic optimization algorithm. In the scheme, the private keys of CA (certificate agency) and KDC (key distribution center) are generated with an adaptive optimization algorithm according to the optimization principles of bionic evolution. The optimization algorithm avoids the indefinite security problems in private key selection, and effectively prevents certificate forgery and coalition attack by dishonest users and other adversaries. And the optimization algorithm can also be applied to generate other secret parameters in advance. The algorithms of the scheme take great advantage of the superiority of ECC (elliptic curves cryptosystem), such as high efficiency, short key length and etc. The designing strategy not only reinforces the security, stability and robustness of key management scheme but also improves the application efficiency regarding software and hardware environment.
Keywords :
optimisation; private key cryptography; public key cryptography; adaptive optimization algorithm; bionic evolution; bionic optimization algorithm; certificate agency; certificate forgery; coalition attack; elliptic curves cryptosystem; indefinite security problems; key distribution center; key management scheme; private key selection; private keys; Algorithm design and analysis; Application software; Design optimization; Elliptic curve cryptography; Elliptic curves; Environmental management; Forgery; Hardware; Robust stability; Security; adaptive optimization; bionic evolution; coalition attack; key management; system efficiency;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligent Information Technology Application, 2009. IITA 2009. Third International Symposium on
Conference_Location :
Nanchang
Print_ISBN :
978-0-7695-3859-4
Type :
conf
DOI :
10.1109/IITA.2009.507
Filename :
5369405
Link To Document :
بازگشت