Scheduled System Maintenance on May 29th, 2015:
IEEE Xplore will be upgraded between 11:00 AM and 10:00 PM EDT. During this time there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

Bionic Optimized Key Management Scheme Based on Elliptic Curves Cryptosystem

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Xuanwu Zhou ; Key Lab. of Network & Inf. Security, Chinese Armed Police Force, Xi''an, China

Key management is an essential part in designing secure and reliable cryptography scheme. In the paper, we analyzed the basic interacting protocols for key management on RSA asymmetric cryptosystem and presented an improved authenticated encryption scheme based on ECC (elliptic curves cryptosystem). In the scheme, the essential parameters for key generating and distribution are transmitted with authenticated algorithms, the generation and distribution of master key is connected with the identity information of key distributing center and valid users. The attack on the authenticated cipher-text and the secret parameters via public information is equivalent to ECDLP (elliptic curves discrete logarithm problem), which is computationally infeasible without polynomial algorithms. The utilization of random encryption in key generating renders effective protection for the secrecy of private keys and the identity information of key applicants. Compared with traditional schemes, key management with optimization has much superiority in security and efficiency for hardware and software application.

Published in:

Future Information Technology and Management Engineering, 2009. FITME '09. Second International Conference on

Date of Conference:

13-14 Dec. 2009