Abstract
WAP Forum recommends to use WTLS handshake protocol and signText() function to certify the POP (proof of possession) of authentication key and signing key. However, it causes plenty of computation and communication overload to mobile devices with low computation and communication power. In this paper, we propose an efficient POP confirmation protocol based on the signcryption scheme, which requires less computation and communication cost. It would be useful for the wireless and wired PKI. The proposed protocol is based on Zheng’s signcryption scheme, because it is the first and only signcryption scheme submitted to the international standard institute(IEEE p1363).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Adams, C., Farrell, S., Kause, T., Mononen, T.: Internet X.509 Public Key Infrastructure Certificate Management Protocols, IETF RFC 4210 (September 2005)
Schaad, J.: Internet X.509 Certificate Request Message Format, IETF RFC 4211 (September 2005)
Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed Hashing for Message Authentication, RFC 2104 (February 1997)
Cheng, P., Glenn, R.: Test Cases for HMAC-MD5 and HMAC-SHA-1, RFC 2202 (September 1997)
FIPS PUB 186-2 Digital Signature Standard (January 27, 2000)
ANSI X9.62 Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA)
Zheng, Y.: Digital signcryption or how to achieve cost (Signature & encryption) < < cost(Signature) + cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)
de Bruijn, N.G.: Signcryption and its application in efficient public key solution. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol. 1396, pp. 291–312. Springer, Heidelberg (1998)
IEEE P1363a: Statndard Specifications for Public-Key Cryptography: Additional Techniques, Shortened Digital Signature, Signcryption and Compact and Unforgeable Key Agreement Schemes, Yuliang Zheng (1998)
Wireless Application Protocol Public Key Infrastructure Definition, WAP-217- WPKI Version (April 24, 2001)
Wireless Application Protocol WMLScript Crypto Library, WAP-161- WMLScriptCrypto-20010620-a Version (June 20, 2001)
Kwak, D.J., Ha, J.C., Lee, H.J., Kim, H.K., Moon, S.J.: A WTLS Handshake Protocol with User Anonymity and Forward Secrecy. In: Lee, J.-Y., Kang, C.-H. (eds.) CIC 2002. LNCS, vol. 2524, pp. 219–230. Springer, Heidelberg (2003) (revised papers)
Signcryption Central, http://www.signcryption.net/publications/
MIRACL (Multiprecision Integer and Rational Arithmetic C/C++ Library) of Shamus Software Ltd., http://indigo.ie/~mscott/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, S., Kim, K., Jung, J., Won, D. (2006). An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKI. In: Atzeni, A.S., Lioy, A. (eds) Public Key Infrastructure. EuroPKI 2006. Lecture Notes in Computer Science, vol 4043. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11774716_18
Download citation
DOI: https://doi.org/10.1007/11774716_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-35151-1
Online ISBN: 978-3-540-35152-8
eBook Packages: Computer ScienceComputer Science (R0)