An End-to-End Secure Mail System Based on Certificateless Cryptography in the Standard Security Model
نویسندگان
چکیده
Most of the existing mailing systems provide limited authentication mechanisms, including web trust model, password authentication or identity based cryptography. Few existing mailing systems found in the literature provide strong authentication based on public key infrastructure (PKI). However, PKI based-systems generally suffer from certificate management and scalability problems. This paper proposes a mailing system that is based on certificeteless cryptography. In the proposed mailing system the message payload is encrypted by a per-mail symmetric key generated from a secret value, the public and private keys of the sender and the receiver at each side. The proposed mailing system is secure against standard security model and provides many security properties.
منابع مشابه
An efficient certificateless signcryption scheme in the standard model
Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...
متن کاملProvably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model
Similar to certificateless cryptography, certificate-based cryptography is another novel public key setting which combines the merits of traditional public key cryptography (PKC) and identity-based cryptography (IBC). Both certificateless cryptography and certificate based cryptography do not have the key escrow problem in identity-based cryptography, and greatly reduce the overhead of certific...
متن کاملPractical Implementation of a Secure Email System Using Certificateless Cryptography and Domain Name System
Email is currently the most widely used communication system in daily life. To improve security and efficiency, most email systems adopt Public Key Infrastructure (PKI) as the mechanism to implement security, but PKI based systems suffer from expensive certificate management and problems in scalability. Identity Based Cryptography (IBC) is another method, but it has the inherent drawback of Key...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013