Skip to main content

Authentication of Real-Time Communication System Using KIS Scheme

  • Conference paper
  • First Online:
Advanced Technologies, Embedded and Multimedia for Human-centric Computing

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 260))

  • 1485 Accesses

Abstract

In global communication environment, signature computation will be frequently performed on a relatively insecure device that cannot be trusted all times to maintain the secrecy of the private key. To deal with this, Dodis et al. [1] proposed a strong key-insulated signature schemes whose goal is to minimize the damage caused by secret-key exposures. This environment will become more important when we focus on real time communication like telephony, TV shopping, electronic voting etc. Any flaws in the authentication system cause a critical damage to the real time environment. Considering this scenario we proposed a KIS scheme based on elliptic curve cryptography, which minimizes the damage of key exposer. Its security is based on elliptic curve discrete logarithm problem (ECDLP) assumption, and efficient in terms of computational cost and signature size.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Dodis Y, Katz J, Xu S, Yung M (2003) Strong key-insulated signature scheme. In: Public Key Cryptography PCK, pp 130–144

    Google Scholar 

  2. Kopetz H (2011) Real-time system: design principles for distributed embedded applications, vol 25. Springer

    Google Scholar 

  3. Lin L, Lin P (2007) Orchestration in web services and real-time communications. Commun Mag, IEEE 45(7):44–50

    Article  Google Scholar 

  4. Barker E, Barker W, Burr W, Polk W, Smid M (2011) Recommendation for key-management-part 1: general (revision 3). NIST Spec Publ 800:57

    Google Scholar 

  5. Dodis Y, Katz J, Xu S, Yung M (2002) Key-insulated public key cryptosystems. In: Advances in cryptology Eurocrypt, Springer pp 65–82

    Google Scholar 

  6. Gonzalez-Deleito N, Markoitch O, DallOlio E (2004) A new key-insulated signature scheme. In: Information and communication security, pp 9–12

    Google Scholar 

  7. Ohtake G, Ogawa K (2012) Application authentication for hybrid services of broadcasting and communication networks. In: Information security applications, pp 171–186

    Google Scholar 

  8. Ohtake G, Hanaoka G, Ogawa K (2010) Efficient provider authentication for bidirectional broadcasting services. IEICE Trans Fundam Electron, Commun Comput Sci 93(6):1039–1051

    Google Scholar 

  9. Matsuda T, Hanaoka G, Ogawa K (2007) A practical provider authentication system for bidirectional broadcast service. In: Knowledge based intelligent information and engineering systems. Springer, pp 967–974

    Google Scholar 

  10. Ohtake G, Hanaoka G, Ogawa K (2008) An efficient strong key-insulated signature scheme and its application. In: Public key infrastructure, PKI, pp 150–165

    Google Scholar 

  11. Weng J, Liu S, Chen K, Li X (2006) Identity based key-insulated signature with secure key-updates. In: Information security and cryptology. Springer, pp 13–26

    Google Scholar 

  12. Weng J, Liu S, Chen K, Ma C (2007) Identity based key-insulated signature without random oracles. In: Computational intelligence and security, pp 470–480

    Google Scholar 

  13. Du H, Li J, Zhang Y, Li T, Zhang Y (2012) Certificate based key-insulated signature. In: Data and knowledge engineering. Springer, pp 206–220

    Google Scholar 

  14. Wu TY, Tseng YM, Yu CW (2012) Id based key-insulated signature scheme with batch verifications and its novel applications. In: Int J Innovative Comput, Inf Control 8(7(A)):4797–4810

    Google Scholar 

  15. Nickalls R (1993) A new approach to solving the cubic: Cardan’s solution revealed. In: The mathematical Gazette. pp 354–359

    Google Scholar 

  16. Stallings W (2003) Cryptography and network security, principles and practices. Practice Hall

    Google Scholar 

  17. Koblitz N (1987) Elliptic curve cryptosystem. Math Comput 48(177):203–209

    Article  MathSciNet  MATH  Google Scholar 

  18. Remarks on the security of elliptic curve cryptosystem: a Certicom white paper, CTEC Cryptosystem, updated July (2000). http://www.certicom.com/

Download references

Acknowledgments

The paper is supported partially by the “Cross-platform smart phone-enable stroke prevention and rehabilitation health system” project and partially by the NSC-101-2811-E-008-013 project.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Binayak Kar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Kar, B., Wu, E.Hk. (2014). Authentication of Real-Time Communication System Using KIS Scheme. In: Huang, YM., Chao, HC., Deng, DJ., Park, J. (eds) Advanced Technologies, Embedded and Multimedia for Human-centric Computing. Lecture Notes in Electrical Engineering, vol 260. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-7262-5_140

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-7262-5_140

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-7261-8

  • Online ISBN: 978-94-007-7262-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics