Abstract
This paper reviews the basic content of key management, points out the limitation of the existing key agreement protocols. It introduces RSA public key cryptosystems in detail and homomorphic encryption scheme in the integer ring. The homomorphism key agreement based on RSA is presented. Compared with Diffie-Hellman protocol, its operation speed is more quickly; Compared with key agreement protocol based on password, it has better security. The protocol can use the public key of RSA to create the contributory forward secrecy the session key. Finally, the security of the protocol is proved by BAN logic.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
Diffie W, Hellman M. New Directions in Cryptography [J].IEEE Trans Inform Theory, 1976,IT-22(6): 644–654.
Steiner M, Tsudik G, Waidner M. Key Agreement in Dynamic Peer Groups [J].IEEE Trans Parallel and Distributed Systems, 2000,11(8): 769–780.
Du W, Deng J, Han Y,et al. A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge [C]//Proceedings of the IEEE Infocom'04. Piscataway, March, 2004: 586–597.
Rivest R L, Shamir A, Adleman L. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems [J].Communications of the ACM, 1978,21(2): 120–126.
Xiang Guangli, Chen Xinmeng, Zhu Ping,et al. A Method of Homomorphic Encryption [J].Wuhan University Journal of Natural Sciences, 2006,11(1): 181–184.
Rivest R L, Adlem A L, Dertouzos M L.On Data Banks and Privacy Homomorphism [M]. New York: Academic Press, 1978: 169–179.
Domingo F J, Herrera J J. A New Privacy Homorphism and Applications [J].Information Processing Letters, 1996,60(5): 277–282.
Sander T, Tschudin C. Towards Mobile Cryptography [C]//Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA: IEEE Computer Society Press, 1998.
Burrows M, Abadi M, Needham R.A Logic of Authentication [M], New York: Digital Systems Research Center, 1989.
Agray N. BAN Logics for Industrial Security Protocol [C]//CEEMAS 2001, Cracow, Poland, 2001: 26–36.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Natural Science Foundation of China (90104005).
Biography: XIANG Guangli (1973-), male, Associate professor, Ph. D., research direction: mobile computing, information security.
Rights and permissions
About this article
Cite this article
Guangli, X., Ping, Z., Junhong, Z. et al. Homomorphism key agreement based on RSA. Wuhan Univ. J. Nat. Sci. 11, 1609–1612 (2006). https://doi.org/10.1007/BF02831832
Received:
Issue Date:
DOI: https://doi.org/10.1007/BF02831832