Authentication of real-time communication system using KIS scheme

Binayak Kar, Eric Hsiao Kuang Wu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

In global communication environment, signature computation will be frequently performed on a relatively insecure device that cannot be trusted all times to maintain the secrecy of the private key. To deal with this, Dodis et al. [1] proposed a strong key-insulated signature schemes whose goal is to minimize the damage caused by secret-key exposures. This environment will become more important when we focus on real time communication like telephony, TV shopping, electronic voting etc. Any flaws in the authentication system cause a critical damage to the real time environment. Considering this scenario we proposed a KIS scheme based on elliptic curve cryptography, which minimizes the damage of key exposer. Its security is based on elliptic curve discrete logarithm problem (ECDLP) assumption, and efficient in terms of computational cost and signature size.

Original languageEnglish
Title of host publicationAdvanced Technologies, Embedded and Multimedia for Human-Centric Computing, HumanCom and EMC 2013
Pages1237-1246
Number of pages10
DOIs
StatePublished - 2014
EventAdvanced Technologies, Embedded and Multimedia for Human-Centric Computing, HumanCom and EMC 2013 - , Taiwan
Duration: 23 Aug 201325 Aug 2013

Publication series

NameLecture Notes in Electrical Engineering
Volume260 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

ConferenceAdvanced Technologies, Embedded and Multimedia for Human-Centric Computing, HumanCom and EMC 2013
Country/TerritoryTaiwan
Period23/08/1325/08/13

Fingerprint

Dive into the research topics of 'Authentication of real-time communication system using KIS scheme'. Together they form a unique fingerprint.

Cite this