Skip to main content

An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKI

  • Conference paper
Book cover Public Key Infrastructure (EuroPKI 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4043))

Included in the following conference series:

  • 542 Accesses

Abstract

WAP Forum recommends to use WTLS handshake protocol and signText() function to certify the POP (proof of possession) of authentication key and signing key. However, it causes plenty of computation and communication overload to mobile devices with low computation and communication power. In this paper, we propose an efficient POP confirmation protocol based on the signcryption scheme, which requires less computation and communication cost. It would be useful for the wireless and wired PKI. The proposed protocol is based on Zheng’s signcryption scheme, because it is the first and only signcryption scheme submitted to the international standard institute(IEEE p1363).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adams, C., Farrell, S., Kause, T., Mononen, T.: Internet X.509 Public Key Infrastructure Certificate Management Protocols, IETF RFC 4210 (September 2005)

    Google Scholar 

  2. Schaad, J.: Internet X.509 Certificate Request Message Format, IETF RFC 4211 (September 2005)

    Google Scholar 

  3. Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed Hashing for Message Authentication, RFC 2104 (February 1997)

    Google Scholar 

  4. Cheng, P., Glenn, R.: Test Cases for HMAC-MD5 and HMAC-SHA-1, RFC 2202 (September 1997)

    Google Scholar 

  5. FIPS PUB 186-2 Digital Signature Standard (January 27, 2000)

    Google Scholar 

  6. ANSI X9.62 Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA)

    Google Scholar 

  7. Zheng, Y.: Digital signcryption or how to achieve cost (Signature & encryption) < < cost(Signature) + cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)

    Google Scholar 

  8. de Bruijn, N.G.: Signcryption and its application in efficient public key solution. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol. 1396, pp. 291–312. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  9. IEEE P1363a: Statndard Specifications for Public-Key Cryptography: Additional Techniques, Shortened Digital Signature, Signcryption and Compact and Unforgeable Key Agreement Schemes, Yuliang Zheng (1998)

    Google Scholar 

  10. Wireless Application Protocol Public Key Infrastructure Definition, WAP-217- WPKI Version (April 24, 2001)

    Google Scholar 

  11. Wireless Application Protocol WMLScript Crypto Library, WAP-161- WMLScriptCrypto-20010620-a Version (June 20, 2001)

    Google Scholar 

  12. Kwak, D.J., Ha, J.C., Lee, H.J., Kim, H.K., Moon, S.J.: A WTLS Handshake Protocol with User Anonymity and Forward Secrecy. In: Lee, J.-Y., Kang, C.-H. (eds.) CIC 2002. LNCS, vol. 2524, pp. 219–230. Springer, Heidelberg (2003) (revised papers)

    Google Scholar 

  13. Signcryption Central, http://www.signcryption.net/publications/

  14. MIRACL (Multiprecision Integer and Rational Arithmetic C/C++ Library) of Shamus Software Ltd., http://indigo.ie/~mscott/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, S., Kim, K., Jung, J., Won, D. (2006). An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKI. In: Atzeni, A.S., Lioy, A. (eds) Public Key Infrastructure. EuroPKI 2006. Lecture Notes in Computer Science, vol 4043. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11774716_18

Download citation

  • DOI: https://doi.org/10.1007/11774716_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-35151-1

  • Online ISBN: 978-3-540-35152-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics