A certificateless one-way group key agreement protocol for end-to-end email encryption

被引:2
|
作者
Yeh, Jyh-haw [1 ]
Sridhar, Srisarguru [1 ]
Dagher, Gaby G. [1 ]
Sun, Hung-Min [2 ,3 ]
Shen, Ning [1 ]
White, Kathleen Dakota [4 ]
机构
[1] Boise State Univ, Dept Comp Sci, Boise, ID 83725 USA
[2] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu, Taiwan
[3] Acad Sinica, Res Ctr Informat Technol Innovat, Taipei, Taiwan
[4] Univ N Carolina, Dept Appl Math, Asheville, NC USA
关键词
End-to-end email encryption; One-way group key agreement; Certificateless PKC; SIGNATURE;
D O I
10.1109/PRDC.2018.00014
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Over the years, email has evolved into one of the most widely used communication channels for both individuals and organizations. However, despite near ubiquitous use in much of the world, current information technology standards do not place emphasis on email security. Not until recently, webmail services such as Yahoo's mail and Google's gmail started to encrypt emails for privacy protection. However, the encrypted emails will be decrypted and stored in the service provider's servers. If the servers are malicious or compromised, all the stored emails can be read, copied and altered. Thus, there is a strong need for end-to-end (E2E) email encryption to protect email user's privacy. In this paper, we present a certificateless one-way group key agreement protocol with the following features, which are suitable to implement E2E email encryption: (1) certificateless and thus there is no key escrow problem and no public key certificate infrastructure is required; (2) one-way group key agreement and thus no back-and-forth message exchange is required; and (3) n-party group key agreement (not just 2- or 3-party). This paper also provides a security proof for the proposed protocol using "proof by simulation". Finally, efficiency analysis of the protocol is presented at the end of the paper.
引用
收藏
页码:34 / 43
页数:10
相关论文
共 50 条
  • [41] A strongly secure and efficient certificateless authenticated asymmetric group key agreement protocol
    Sun H.
    Cai Z.
    Zhang J.
    Zhang L.
    Gan Y.
    Sun, Haiyan (sunhaiyan2520@163.com), 2018, Totem Publishers Ltd (14) : 2831 - 2841
  • [42] Certificateless authenticated group key agreement protocol for unbalanced wireless mobile networks
    Lu, Chung-Fu
    Wu, Tzong-Chen
    Hsu, Chien-Lung
    WSEAS Transactions on Communications, 2009, 8 (11): : 1145 - 1159
  • [43] A certificateless group authenticated key agreement protocol based on dynamic binary tree
    Sun, Yang
    Yin, Shoulin
    Liu, Jie
    Teng, Lin
    International Journal of Network Security, 2019, 21 (05): : 843 - 849
  • [44] A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks
    Ren, Huimin
    Kim, Suhyun
    Seo, Daehee
    Lee, Imyeong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2022, 16 (05): : 1687 - 1707
  • [45] Enhancement of an authenticated multiple-key agreement protocol without using conventional one-way function
    Huang, HF
    Chang, CC
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 554 - 559
  • [46] Improved authenticated multiple-key agreement protocol without using conventional one-way function
    Chien, HY
    Jan, JK
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 147 (02) : 491 - 497
  • [47] Security of robust generalized MQV key agreement protocol without using one-way hash functions
    Shao, ZH
    COMPUTER STANDARDS & INTERFACES, 2003, 25 (05) : 431 - 436
  • [48] Proxy-based End-to-End Key Establishment Protocol for the Internet of Things
    Porambage, Pawani
    Braeken, An
    Kumar, Pardeep
    Gurtov, Andrei
    Ylianttila, Mika
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOP (ICCW), 2015, : 2677 - 2682
  • [49] A Dynamic Identity End-to-End Authentication Key Exchange Protocol for IoT Environments
    Hsu, Chien-Lung
    Chuang, Tzu-Hsien
    Chen, Yu-Han
    Lin, Tzu-Wei
    Lu, Huang-Chia
    2017 TWELFTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT (ICDIM), 2017, : 133 - 138
  • [50] An end-to-end secure key management protocol for e-health applications
    Abdmeziem, Mohammed Riyadh
    Tandjaoui, Djamel
    COMPUTERS & ELECTRICAL ENGINEERING, 2015, 44 : 184 - 197