Please use this identifier to cite or link to this item:
https://hdl.handle.net/11147/4776
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ustaoğlu, Berkant | - |
dc.date.accessioned | 2017-02-01T12:41:23Z | - |
dc.date.available | 2017-02-01T12:41:23Z | - |
dc.date.issued | 2011-08 | - |
dc.identifier.citation | Ustaoğlu, B., (2011). Integrating identity-based and certificate-based authenticated key exchange protocols. International Journal of Information Security, 10(4), 201-212. doi:10.1007/s10207-011-0136-3 | en_US |
dc.identifier.issn | 1615-5262 | - |
dc.identifier.uri | http://doi.org/10.1007/s10207-011-0136-3 | - |
dc.identifier.uri | http://hdl.handle.net/11147/4776 | - |
dc.description.abstract | Key establishment is becoming a widely deployed cryptographic primitive. As such, there has been extensive research on designing algorithms that produce shared secret keys. These protocols require parties to either hold certificates or rely on identity (ID)-based primitives to achieve authentication. Chain and cross certifications allow users trusting different certification authorities to interact. Similarly, there are methods to extend ID-based solutions across multiple key generation centers (KGC). However, there has been no dedicated work on interoperability between the two settings. A straightforward solution would require each user to maintain certificates and ID-based static keys to accommodate all peers. The cost of maintaining many secret keys; matching keys with protocols; and preventing undesired interference would arguably make such a solution impractical. In this work, we offer an alternative where a user needs to keep a single static key pair and can subsequently engage in a session key establishment with peers holding certificates or identity-based keys. Thus, the proposed solution has none of disadvantages of maintaining multiple static private keys. © 2011 Springer-Verlag. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Springer Verlag | en_US |
dc.relation.ispartof | International Journal of Information Security | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject | Authenticated key establishment | en_US |
dc.subject | Certificate-based protocols | en_US |
dc.subject | ID-based protocols | en_US |
dc.subject | Shared static state | en_US |
dc.subject | Authentication | en_US |
dc.title | Integrating identity-based and certificate-based authenticated key exchange protocols | en_US |
dc.type | Article | en_US |
dc.authorid | TR102756 | en_US |
dc.institutionauthor | Ustaoğlu, Berkant | - |
dc.identifier.volume | 10 | en_US |
dc.identifier.issue | 4 | en_US |
dc.identifier.startpage | 201 | en_US |
dc.identifier.endpage | 212 | en_US |
dc.identifier.wos | WOS:000293960400001 | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.identifier.doi | 10.1007/s10207-011-0136-3 | - |
dc.relation.doi | 10.1007/s10207-011-0136-3 | en_US |
dc.coverage.doi | 10.1007/s10207-011-0136-3 | en_US |
dc.identifier.wosquality | Q2 | - |
dc.identifier.scopusquality | Q2 | - |
item.fulltext | With Fulltext | - |
item.grantfulltext | open | - |
item.languageiso639-1 | en | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
item.openairetype | Article | - |
crisitem.author.dept | 04.02. Department of Mathematics | - |
Appears in Collections: | Mathematics / Matematik Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
CORE Recommender
SCOPUSTM
Citations
11
checked on Nov 15, 2024
WEB OF SCIENCETM
Citations
7
checked on Nov 9, 2024
Page view(s)
242
checked on Nov 18, 2024
Download(s)
234
checked on Nov 18, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.