P2P email encryption by an identity-based one-way group key agreement protocol

被引:0
|
作者
Yeh, Jyh-Haw [1 ]
Zeng, Fiona [1 ]
Long, Thomas [1 ]
机构
[1] Boise State Univ, Dept Comp Sci, Boise, ID 83725 USA
关键词
P2P encryption; Identity-based encryption; One-way group-key agreement; Bilinear pairings;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As a result of high-tech companies such as Google, Yahoo, and Microsoft offering free email services, email has become a primary channel of communication. However, email service providers have traditionally offered little in the way of message privacy protection. This has made emails, of which billions are sent around the world on any day, an attractive data source for personal identity information thieves. Google was one of the first companies to provide substantial email privacy protection when they began using the HTTPS always-on option to encrypt messages sent through their email service, Gmail. Unfortunately, Gmail's encryption option does not offer true point-to-point encryption since the encrypted emails are decrypted and stored in plaintext form on Google's servers. This type of approach poses a security vulnerability which is unacceptable to security-minded users such as highly sensitive government agencies and private companies. For these users, true point-to-point encryption is needed. This paper introduces an identity-based one-way group key agreement protocol and describes a point-to-point email encryption scheme based on the protocol. Both the security proofs and the efficiency analysis, with experimental results, of the new scheme are provided.
引用
收藏
页码:760 / 767
页数:8
相关论文
共 50 条
  • [41] Efficient identity-based authenticated key agreement protocol from pairings
    Choie, YJ
    Jeong, E
    Lee, E
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (01) : 179 - 188
  • [42] A Provably Secure Identity-based Authentication Multiple Key Agreement Protocol
    Tan Zuowen
    CHINA COMMUNICATIONS, 2011, 8 (02) : 26 - 33
  • [43] Identity-based authenticated key agreement protocol cross autonomous domains
    Zhang, Xue
    Li, Guangsong
    Han, Wenbao
    Ji, Huifang
    Hu, Hongyu
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2015, 47 (04): : 125 - 131
  • [44] Identity based authenticated group key agreement protocol
    Reddy, KC
    Nalla, D
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS, 2002, 2551 : 215 - 233
  • [45] An improved identity-based key agreement protocol and its security proof
    Wang, Shengbao
    Cao, Zhenfu
    Choo, Kim-Kwang Raymond
    Wang, Lihua
    INFORMATION SCIENCES, 2009, 179 (03) : 307 - 318
  • [46] Certificateless One-Way Authenticated Two-Party Key Agreement Protocol
    Chen, Wuping
    Zhang, Lei
    Qin, Bo
    Wu, Qianhong
    Zhang, Huanguo
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 483 - +
  • [47] A Provably Secure Identity-Based Key Agreement Protocol from Key Encapsulation Scheme
    Cai, Yang
    Xu, Qiuliang
    Zheng, Zhihua
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 636 - 640
  • [48] A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks
    Islam, S. K. Hafizul
    Biswas, G. P.
    ANNALS OF TELECOMMUNICATIONS, 2012, 67 (11-12) : 547 - 558
  • [49] A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks
    SK Hafizul Islam
    G. P. Biswas
    annals of telecommunications - annales des télécommunications, 2012, 67 : 547 - 558
  • [50] Provably Secure Identity-based Group Key Exchange Protocol
    SangJae Moon
    中国通信, 2007, 4 (04) : 11 - 22