A certificateless one-way group key agreement protocol for end-to-end email encryption

被引:2
|
作者
Yeh, Jyh-haw [1 ]
Sridhar, Srisarguru [1 ]
Dagher, Gaby G. [1 ]
Sun, Hung-Min [2 ,3 ]
Shen, Ning [1 ]
White, Kathleen Dakota [4 ]
机构
[1] Boise State Univ, Dept Comp Sci, Boise, ID 83725 USA
[2] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu, Taiwan
[3] Acad Sinica, Res Ctr Informat Technol Innovat, Taipei, Taiwan
[4] Univ N Carolina, Dept Appl Math, Asheville, NC USA
关键词
End-to-end email encryption; One-way group key agreement; Certificateless PKC; SIGNATURE;
D O I
10.1109/PRDC.2018.00014
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Over the years, email has evolved into one of the most widely used communication channels for both individuals and organizations. However, despite near ubiquitous use in much of the world, current information technology standards do not place emphasis on email security. Not until recently, webmail services such as Yahoo's mail and Google's gmail started to encrypt emails for privacy protection. However, the encrypted emails will be decrypted and stored in the service provider's servers. If the servers are malicious or compromised, all the stored emails can be read, copied and altered. Thus, there is a strong need for end-to-end (E2E) email encryption to protect email user's privacy. In this paper, we present a certificateless one-way group key agreement protocol with the following features, which are suitable to implement E2E email encryption: (1) certificateless and thus there is no key escrow problem and no public key certificate infrastructure is required; (2) one-way group key agreement and thus no back-and-forth message exchange is required; and (3) n-party group key agreement (not just 2- or 3-party). This paper also provides a security proof for the proposed protocol using "proof by simulation". Finally, efficiency analysis of the protocol is presented at the end of the paper.
引用
收藏
页码:34 / 43
页数:10
相关论文
共 50 条
  • [31] Robust generalized MQV key agreement protocol without using one-way hash functions
    Tseng, YM
    COMPUTER STANDARDS & INTERFACES, 2002, 24 (03) : 241 - 246
  • [32] Vulnerabilities of generalized MQV key agreement protocol without using one-way hash functions
    Shim, Kyung-Ah
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (04) : 467 - 470
  • [33] A One-Round Certificateless Authenticated Group Key Agreement Protocol for Mobile Ad Hoc Networks
    Cheng, Dongxu
    Liu, Jianwei
    Guan, Zhenyu
    Shang, Tao
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (11): : 2716 - 2722
  • [34] Provably secure one-round certificateless authenticated group key agreement protocol for secure communications
    SK Hafizul Islam
    Abhishek Singh
    Wireless Personal Communications, 2015, 85 : 879 - 898
  • [35] A Protocol for End-to-End Key Establishment during Route Discovery in MANETs
    Talawar, Shrikant H.
    Hansdah, R. C.
    2015 IEEE 29th International Conference on Advanced Information Networking and Applications (IEEE AINA 2015), 2015, : 176 - 184
  • [36] Two-Party Authenticated Key Agreement Protocol from Certificateless Public Key Encryption Scheme
    Hou, Mengbo
    Xu, Qiuliang
    ICMECG: 2009 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT, PROCEEDINGS, 2009, : 440 - 444
  • [37] SECURE COMMUNICATION IN INTERNET ENVIRONMENTS - A HIERARCHICAL KEY MANAGEMENT SCHEME FOR END-TO-END ENCRYPTION
    LU, WP
    SUNDARESHAN, MK
    IEEE TRANSACTIONS ON COMMUNICATIONS, 1989, 37 (10) : 1014 - 1023
  • [38] KEY MANAGEMENT SCHEME FOR END-TO-END ENCRYPTION AND A FORMAL VERIFICATION OF ITS SECURITY.
    Kasami, Tadao
    Yamamura, Saburo
    Mori, Kenichi
    Systems, computers, controls, 1982, 13 (03): : 59 - 69
  • [39] End-to-End Post-Quantum Cryptography Encryption Protocol for Video Conferencing System Based on Government Public Key Infrastructure
    Park, Yeongjae
    Yoo, Hyeondo
    Ryu, Jieun
    Choi, Young-Rak
    Kang, Ju-Sung
    Yeom, Yongjin
    APPLIED SYSTEM INNOVATION, 2023, 6 (04)
  • [40] Group Authentication Key Agreement Protocol Based on Certificateless Cryptography in UAV Network
    Wang, Yuecheng
    Zhu, Youwen
    Zhang, Zhiqiang
    Gongcheng Kexue Yu Jishu/Advanced Engineering Sciences, 2025, 57 (01): : 213 - 224