By Topic

Secured Key Distribution Scheme for Cryptographic Key Management System

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Kyawt Kyawt Khaing ; Network Storage Technol. Div., A* STAR, Singapore, Singapore ; Khin Mi Mi Aung

Key distribution is the task of distributing secret keys between transmitter and receiver by providing security properties. Our key distribution scheme is beneficial for key transactions where the data encrypting key is encrypted with an upper-level key encrypting key and transmitted to the receiving side. We assume there is a trusted authority (TA) in the network which choose a secret key for communicating, and transits it to parties that wants to communicate with. There could be two or more parties that establish a secret key. At the end of a key tree two parties share a key K. The value of K is not known to any other party except TA. This scheme limits amount of cipher text available to an attacker and also limit exposure in event of key compromise. While the other schemes focus to reduce computation, or the amount of data the needs to be exchanged, our scheme is cable of Self-Adaptive key establishment for Large-Scale users as well as reduces the computational complexity.

Published in:

Availability, Reliability, and Security, 2010. ARES '10 International Conference on

Date of Conference:

15-18 Feb. 2010