Browse > Article
http://dx.doi.org/10.1109/JCN.2013.000085

Key Distribution for Heterogeneous Public-Key Cryptosystems  

Lv, Xixiang (National Key Lab. of ISN, Xidian University)
Yi, Mu (University of Wollonggong)
Hui, Li (National Key Lab. of ISN, Xidian University)
Publication Information
Abstract
The widespread use of cryptographic technologies is complicated by inconsistencies and duplication in the key management systems supporting their applications. The proliferation of key management systems or protocols also results in higher operational and infrastructure costs, and fails in interoperability. Thus, it is essential to realize key management interoperability between different and heterogeneous cryptosystems. This paper presents a practical and separable key management system for heterogeneous public-key cryptosystems. We achieve the interoperability between different cryptosystems via cryptography approaches rather than communication protocols. With our scheme, each client can freely use any kind of cryptosystemthat it likes. The proposed scheme has two advantages over the key management interoperability protocol introduced by the organization for the advancement of structured information standards. One is that all the related operations do not involve the communication protocol and thus no special restrictions are taken on the client devices. The other is that the proposed scheme does not suffer from single-point fault and bottleneck problems.
Keywords
Heterogeneous public-key cryptosystems; information security; key management interoperability;
Citations & Related Records
연도 인용수 순위
  • Reference
1 OASIS Committee Specification 01, "Key management interoperability protocol specification version 1.0," KMIP 1.0, 2010. [Online]. Available: http://docs.oasis-open.org/kmip/spec/v1.0/cs01/kmip-spec-1.0-cs-01.doc
2 OASIS Committee Specification 01, "Key management interoperability protocol usage guide version 1.0," KMIPUG 1.0, 2010. [Online]. Available: http://docs.oasis-open.org/kmip/ug/v1.0/cs01/kmip-ug-1.0-cs-01.doc
3 OASIS Committee Specification 01, "Key management interoperability protocol use cases version 1.0," KMIPUC 1.0, 2010. [Online]. Available: http://docs.oasis-open.org/kmip/usecases/v1.0/cs01/kmip-usecases-1.0-cs-01.doc
4 OASIS, "KMIP key management standard on OASIS annual meeting of 2012," June 2012. [Online]. Available: http://www.youtube.com/watch?v=N6Xp71cRXEg&feature=plcp
5 J. Kilian and E. Petrank, "Identity escrow." in Proc. Cryptology-CRYPTO, Santa Barbara, California, Aug. 1998, pp. 169-185.
6 J. Camenisch and M. Michels, "Separability and efficiency for generic group signature schemes." in Proc. Cryptology-CRYPTO, Santa Barbara, California, Aug. 1999, pp. 413-430.
7 J. K. Liu, V. K.Wei, and D. S.Wong. "A separable threshold ring signature scheme." in Proc. ICISC, Seoul, Korea, Nov. 2003, pp. 12-26.
8 W. Susilo, F. Zhang, and Y. Mu. "Separable threshold decryption for wireless networks." in Proc. Signals Commun. Tech., 2008, p. 89.
9 M. Bellare and P. Rogaway. "Optimal asymmetric encryption." in Proc. Cryptology-EUROCRYPT, Perugia, Italy, May 1994, pp. 92-111.
10 D. Boneh and M. Franklin. "Identity-based encryption from the Weil pairing." in Proc. Cryptology-CRYPTO, Santa Barbara, California, USA, Aug. 2001, pp. 213-229.