TTP Based High-Efficient Multi-Key Exchange Protocol
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tsai, Kun-Lin | - |
dc.contributor.author | Huang, Yi-Li | - |
dc.contributor.author | Leu, Fang-Yie | - |
dc.contributor.author | You, Ilsun | - |
dc.date.accessioned | 2021-08-11T18:45:45Z | - |
dc.date.available | 2021-08-11T18:45:45Z | - |
dc.date.issued | 2016 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/9918 | - |
dc.description.abstract | With a trusted-third-party (TTP)-based key exchange protocol, when a user would like to transmit a message to another user, the transmitted data are encrypted by a session key exchanged between the two ends of the corresponding connection with the help of the TTP. Up to present, due to the assistance of a TTP, this type of protocols has performed well in protecting messages delivered between two authorized users. Even this, inflexibility, unreliability, and inefficiency problems still exist in these previously proposed protocols. Therefore, in this paper, a multi-key exchange protocol, named the TTP-based high-efficient multi key exchange protocol (THMEP), is proposed to provide users with a secure and efficient protocol, which employs the elliptic curve cryptography, a 2-D operation, and a current time encryption key, to exchange their session keys. The proposed protocol not only effectively hides important encryption parameters, but also achieves fully mutual authentication between a user and his/her trusted server. It can resist known-key, impersonation, replay, eavesdropping, and forgery attacks. Besides, the THMEP generates 40 session keys in a key exchange process, meaning the proposed protocol can support 40 sessions simultaneously. It also shortens the processing time, which is 3.78 times faster than that of a specific previous study. Its security level and performance are higher than those of the compared state-of-the-art protocols. In other words, the THMEP is very suitable for IoT applications. | - |
dc.format.extent | 11 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.title | TTP Based High-Efficient Multi-Key Exchange Protocol | - |
dc.type | Article | - |
dc.publisher.location | 미국 | - |
dc.identifier.doi | 10.1109/ACCESS.2016.2613442 | - |
dc.identifier.scopusid | 2-s2.0-85012170733 | - |
dc.identifier.wosid | 000388196100005 | - |
dc.identifier.bibliographicCitation | IEEE Access, v.4, pp 6261 - 6271 | - |
dc.citation.title | IEEE Access | - |
dc.citation.volume | 4 | - |
dc.citation.startPage | 6261 | - |
dc.citation.endPage | 6271 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | MOBILE-COMMERCE | - |
dc.subject.keywordPlus | SECURE | - |
dc.subject.keywordPlus | CRYPTANALYSIS | - |
dc.subject.keywordPlus | SYSTEM | - |
dc.subject.keywordAuthor | Multiple key exchange | - |
dc.subject.keywordAuthor | trusted third party | - |
dc.subject.keywordAuthor | elliptic curve cryptosystem | - |
dc.subject.keywordAuthor | two-dimensional operation | - |
dc.subject.keywordAuthor | current time encryption key | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.