P2P email encryption by an identity-based one-way group key agreement protocol

被引:0
|
作者
Yeh, Jyh-Haw [1 ]
Zeng, Fiona [1 ]
Long, Thomas [1 ]
机构
[1] Boise State Univ, Dept Comp Sci, Boise, ID 83725 USA
关键词
P2P encryption; Identity-based encryption; One-way group-key agreement; Bilinear pairings;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As a result of high-tech companies such as Google, Yahoo, and Microsoft offering free email services, email has become a primary channel of communication. However, email service providers have traditionally offered little in the way of message privacy protection. This has made emails, of which billions are sent around the world on any day, an attractive data source for personal identity information thieves. Google was one of the first companies to provide substantial email privacy protection when they began using the HTTPS always-on option to encrypt messages sent through their email service, Gmail. Unfortunately, Gmail's encryption option does not offer true point-to-point encryption since the encrypted emails are decrypted and stored in plaintext form on Google's servers. This type of approach poses a security vulnerability which is unacceptable to security-minded users such as highly sensitive government agencies and private companies. For these users, true point-to-point encryption is needed. This paper introduces an identity-based one-way group key agreement protocol and describes a point-to-point email encryption scheme based on the protocol. Both the security proofs and the efficiency analysis, with experimental results, of the new scheme are provided.
引用
收藏
页码:760 / 767
页数:8
相关论文
共 50 条
  • [1] A certificateless one-way group key agreement protocol for end-to-end email encryption
    Yeh, Jyh-haw
    Sridhar, Srisarguru
    Dagher, Gaby G.
    Sun, Hung-Min
    Shen, Ning
    White, Kathleen Dakota
    2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 34 - 43
  • [2] An Efficient Identity-Based Group Key Agreement Protocol
    Ping, Zeng
    Yong, Fang
    Yue, Liu
    Hu Ronglei
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2821 - 2825
  • [3] An efficient group key agreement protocol for secure P2P communication
    Vijayakumar, Pandi
    Naresh, Ramu
    Deborah, Lazarus Jegatha
    Islam, Sk Hafizul
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 3952 - 3965
  • [4] Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    COMPUTING AND COMBINATORICS, 2010, 6196 : 510 - 519
  • [5] An identity-based group key agreement protocol from pairing
    Wang, Hongji
    Yao, Gang
    Jiang, Qingshan
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 532 - +
  • [6] P2P Social Network with Partitioned Dynamic Identity-Based Broadcast Encryption
    Meligy, Ali
    Abdo, Azzaa A.
    Alazab, Ayman
    ICENCO 2016 - 2016 12TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO) - BOUNDLESS SMART SOCIETIES, 2016, : 164 - 168
  • [7] A Key Agreement Protocol for P2P VoIP Applications
    Pecori, Riccardo
    Veltri, Luca
    2009 INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS, 2009, : 276 - 280
  • [8] One round identity-based authenticated conference key agreement protocol
    Kim, JS
    Kim, HC
    Ha, KJ
    Yoo, KY
    UNIVERSAL MULTISERVICE NETWORKS, PROCEEDINGS, 2004, 3262 : 407 - 416
  • [9] An identity-based security mechanism for P2P VoIP
    Jiang, Hua
    Jia, Yongxing
    Du, Xianru
    Wang, Weizhi
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 481 - +
  • [10] Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    INFORMATION SCIENCES, 2011, 181 (19) : 4318 - 4329