Secure Multicast Key Protocol for E-Mail System Using Factorial Number Structure

被引:0
|
作者
Chen, Hsing-Chung [1 ]
Lee, Chao-Ching [2 ]
Mao, Chuan-Hsien [2 ]
Pan, Chun-Cheng
机构
[1] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
[2] Asia Univ, Inst Comp Sci & Informat Engn, Taichung 41354, Taiwan
关键词
Factorial Number Structure; E-Mail; Security; Cryptography; PROVIDING PERFECT; SECRECY;
D O I
10.1109/IMIS.2013.108
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Electronic mail (e-mail) system are widely are used in Internet. A user usually needs to send an e-mail to a specific group of users via a secure delivery mechanism. In this paper, a new e-mail delivery mechanism using secure multicast key protocol with ID-based factorial number structure (ID-based FNS) is proposed in an encryption multicast system. In the e-mail delivery mechanism, the message of e-mail is required to encrypt first before sending out in order to safeguard the secrecy of the message on a public channel, such as wire-lined public switching communication links and wireless communication systems. Without loss generality, the public-key system is usually adopted in the multicast environment for the convenience at the easy key management need. As a manner of fact, the mechanism is having analyzed the space occupation; our scheme outperforms the existed methods in the way of magnitude order of reconstructing secure command key. Besides, the extraction of direct secure command key associated each intended receiver is fast operated to succeed the subsequent e-mail message recovery. Therefore, we provide a new and feasible solution for e-mail message encryption multicast in network system.
引用
收藏
页码:611 / 616
页数:6
相关论文
共 50 条
  • [11] Fast two-key encryption for a secure E-mail application
    Ramani, S.
    Shrikumar, H.
    Proceedings of the International Conference on Computer Communication, 1991,
  • [12] A novel Enterprise Mobile E-mail System using the SyncML protocol
    Xie, Jing
    Yu, Dan
    Ma, Shilong
    7TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE IN CONJUNCTION WITH 2ND IEEE/ACIS INTERNATIONAL WORKSHOP ON E-ACTIVITY, PROCEEDINGS, 2008, : 391 - 396
  • [13] New Secure and Practical E-Mail Protocol with Perfect Forward Secrecy
    Lee, Chien-Ding
    Chen, Tzung-Her
    SYMMETRY-BASEL, 2021, 13 (07):
  • [14] Design and implementation of secure e-mail system using elliptic curve cryptosystem
    Lee, W
    Lee, JW
    FUTURE GENERATION COMPUTER SYSTEMS, 2004, 20 (02) : 315 - 326
  • [15] A certified e-mail protocol
    Schneier, B
    Riordan, J
    14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, : 347 - 352
  • [16] Secure e-mail links on MASAnet
    不详
    SOUTH AFRICAN MEDICAL JOURNAL, 1996, 86 (08): : 916 - 916
  • [17] TRANSPARENT PROXY FOR SECURE E-MAIL
    Michalak, Juraj
    Hudec, Ladislav
    JOURNAL OF ELECTRICAL ENGINEERING-ELEKTROTECHNICKY CASOPIS, 2010, 61 (03): : 183 - 188
  • [18] The Application of Elliptic Curve Cryptography in Secure E-mail System
    Lin, Xia
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS SCIENCE AND ENVIRONMENTAL ENGINEERING, 2016, 52 : 293 - 296
  • [19] An Optimistic Certified E-mail Protocol for the Current Internet E-mail Architecture
    Draper-Gil, Gerard
    Ferrer-Gomila, Josep L.
    Hinarejos, M. Francisca
    Tauber, Arne
    2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 382 - 390
  • [20] Trustworthy e-mail using secure XML Web Services
    Taylor, S
    Watters, PA
    CEC 2005: SEVENTH IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY, PROCEEDINGS, 2005, : 307 - 312