• DocumentCode
    3106543
  • Title

    Bionic Optimized Key Management Scheme Based on Elliptic Curves Cryptosystem

  • Author

    Zhou, Xuanwu

  • Author_Institution
    Key Lab. of Network & Inf. Security, Chinese Armed Police Force, Xi´´an, China
  • fYear
    2009
  • fDate
    13-14 Dec. 2009
  • Firstpage
    369
  • Lastpage
    372
  • Abstract
    Key management is an essential part in designing secure and reliable cryptography scheme. In the paper, we analyzed the basic interacting protocols for key management on RSA asymmetric cryptosystem and presented an improved authenticated encryption scheme based on ECC (elliptic curves cryptosystem). In the scheme, the essential parameters for key generating and distribution are transmitted with authenticated algorithms, the generation and distribution of master key is connected with the identity information of key distributing center and valid users. The attack on the authenticated cipher-text and the secret parameters via public information is equivalent to ECDLP (elliptic curves discrete logarithm problem), which is computationally infeasible without polynomial algorithms. The utilization of random encryption in key generating renders effective protection for the secrecy of private keys and the identity information of key applicants. Compared with traditional schemes, key management with optimization has much superiority in security and efficiency for hardware and software application.
  • Keywords
    cryptographic protocols; private key cryptography; public key cryptography; RSA asymmetric cryptosystem; authenticated encryption scheme; bionic optimized key management scheme; elliptic curves cryptosystem; elliptic curves discrete logarithm problem; identity information; interacting protocols; key distributing center; Conference management; Cryptographic protocols; Educational institutions; Elliptic curve cryptography; Elliptic curves; Engineering management; Information security; Polynomials; Public key cryptography; Technology management; adaptive optimization; bionic evolution; coalition attack; key management; system efficiency;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Future Information Technology and Management Engineering, 2009. FITME '09. Second International Conference on
  • Conference_Location
    Sanya
  • Print_ISBN
    978-1-4244-5339-9
  • Type

    conf

  • DOI
    10.1109/FITME.2009.98
  • Filename
    5381004