DOI QR코드

DOI QR Code

Key Distribution for Heterogeneous Public-Key Cryptosystems

  • Lv, Xixiang (National Key Lab. of ISN, Xidian University) ;
  • Yi, Mu (University of Wollonggong) ;
  • Hui, Li (National Key Lab. of ISN, Xidian University)
  • Received : 2012.09.12
  • Accepted : 2013.06.27
  • Published : 2013.10.31

Abstract

The widespread use of cryptographic technologies is complicated by inconsistencies and duplication in the key management systems supporting their applications. The proliferation of key management systems or protocols also results in higher operational and infrastructure costs, and fails in interoperability. Thus, it is essential to realize key management interoperability between different and heterogeneous cryptosystems. This paper presents a practical and separable key management system for heterogeneous public-key cryptosystems. We achieve the interoperability between different cryptosystems via cryptography approaches rather than communication protocols. With our scheme, each client can freely use any kind of cryptosystemthat it likes. The proposed scheme has two advantages over the key management interoperability protocol introduced by the organization for the advancement of structured information standards. One is that all the related operations do not involve the communication protocol and thus no special restrictions are taken on the client devices. The other is that the proposed scheme does not suffer from single-point fault and bottleneck problems.

Keywords

References

  1. OASIS Committee Specification 01, "Key management interoperability protocol specification version 1.0," KMIP 1.0, 2010. [Online]. Available: http://docs.oasis-open.org/kmip/spec/v1.0/cs01/kmip-spec-1.0-cs-01.doc
  2. OASIS Committee Specification 01, "Key management interoperability protocol usage guide version 1.0," KMIPUG 1.0, 2010. [Online]. Available: http://docs.oasis-open.org/kmip/ug/v1.0/cs01/kmip-ug-1.0-cs-01.doc
  3. OASIS Committee Specification 01, "Key management interoperability protocol use cases version 1.0," KMIPUC 1.0, 2010. [Online]. Available: http://docs.oasis-open.org/kmip/usecases/v1.0/cs01/kmip-usecases-1.0-cs-01.doc
  4. OASIS, "KMIP key management standard on OASIS annual meeting of 2012," June 2012. [Online]. Available: http://www.youtube.com/watch?v=N6Xp71cRXEg&feature=plcp
  5. J. Kilian and E. Petrank, "Identity escrow." in Proc. Cryptology-CRYPTO, Santa Barbara, California, Aug. 1998, pp. 169-185.
  6. J. Camenisch and M. Michels, "Separability and efficiency for generic group signature schemes." in Proc. Cryptology-CRYPTO, Santa Barbara, California, Aug. 1999, pp. 413-430.
  7. J. K. Liu, V. K.Wei, and D. S.Wong. "A separable threshold ring signature scheme." in Proc. ICISC, Seoul, Korea, Nov. 2003, pp. 12-26.
  8. W. Susilo, F. Zhang, and Y. Mu. "Separable threshold decryption for wireless networks." in Proc. Signals Commun. Tech., 2008, p. 89.
  9. M. Bellare and P. Rogaway. "Optimal asymmetric encryption." in Proc. Cryptology-EUROCRYPT, Perugia, Italy, May 1994, pp. 92-111.
  10. D. Boneh and M. Franklin. "Identity-based encryption from the Weil pairing." in Proc. Cryptology-CRYPTO, Santa Barbara, California, USA, Aug. 2001, pp. 213-229.