Secure Multicast Key Protocol for E-Mail System Using Factorial Number Structure

被引:0
|
作者
Chen, Hsing-Chung [1 ]
Lee, Chao-Ching [2 ]
Mao, Chuan-Hsien [2 ]
Pan, Chun-Cheng
机构
[1] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
[2] Asia Univ, Inst Comp Sci & Informat Engn, Taichung 41354, Taiwan
关键词
Factorial Number Structure; E-Mail; Security; Cryptography; PROVIDING PERFECT; SECRECY;
D O I
10.1109/IMIS.2013.108
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Electronic mail (e-mail) system are widely are used in Internet. A user usually needs to send an e-mail to a specific group of users via a secure delivery mechanism. In this paper, a new e-mail delivery mechanism using secure multicast key protocol with ID-based factorial number structure (ID-based FNS) is proposed in an encryption multicast system. In the e-mail delivery mechanism, the message of e-mail is required to encrypt first before sending out in order to safeguard the secrecy of the message on a public channel, such as wire-lined public switching communication links and wireless communication systems. Without loss generality, the public-key system is usually adopted in the multicast environment for the convenience at the easy key management need. As a manner of fact, the mechanism is having analyzed the space occupation; our scheme outperforms the existed methods in the way of magnitude order of reconstructing secure command key. Besides, the extraction of direct secure command key associated each intended receiver is fast operated to succeed the subsequent e-mail message recovery. Therefore, we provide a new and feasible solution for e-mail message encryption multicast in network system.
引用
收藏
页码:611 / 616
页数:6
相关论文
共 50 条
  • [21] Secure multicast key protocol for electronic mail systems with providing perfect forward secrecy
    Chen, Hsing-Chung
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (01) : 100 - 107
  • [22] A forward-secure e-mail protocol without certificated public keys
    Kwon, Jeong Ok
    Jeong, Ik Rae
    Lee, Dong Hoon
    INFORMATION SCIENCES, 2009, 179 (24) : 4227 - 4231
  • [23] An improved e-mail security protocol
    Schneier, B
    Hall, C
    13TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1997, : 227 - 230
  • [24] ACTIVE E-MAIL SYSTEM SMTP PROTOCOL MONITORING ALGORITHM
    Sureswaran, R.
    Al Bazar, Hussein
    Abouabdalla, O.
    Manasrah, Ahmad M.
    El-Taj, Homam
    PROCEEDINGS OF 2009 2ND IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY, 2009, : 257 - 260
  • [25] Provision of Deniability in E-mail Protocol
    Kim, Hyo
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (11): : 299 - 301
  • [26] Keep your e-mail secure with encryption
    不详
    DATAMATION, 1997, 43 (04): : 21 - 22
  • [27] SECURE E-MAIL CHEAPLY WITH SOFTWARE ENCRYPTION
    STRAUSS, P
    DATAMATION, 1993, 39 (23): : 48 - &
  • [28] S/MIME: E-mail gets secure
    Stallings, W
    BYTE, 1998, 23 (07): : 41 - 42
  • [29] Using E-mail to notify pseudonymous E-mail sexual partners
    Vest, Joshua R.
    Valadez, Adolfo M.
    Hanner, Andrea
    Lee, James H.
    Harris, Patrick B.
    SEXUALLY TRANSMITTED DISEASES, 2007, 34 (11) : 840 - 845
  • [30] Key Exchange and E-Mail Authentication Using Lagrange Interpolation
    Kumari, P. Lalitha Surya
    Sekhar, G. Soma
    DATA ENGINEERING AND COMMUNICATION TECHNOLOGY, ICDECT-2K19, 2020, 1079 : 253 - 264