A secure and efficient protocol of multiple session keys generation

To negotiate a session key can benefit from the technique of the public-key cryptography such as key exchange and digital signature. This key cannot be used until the session is finished. In current model such as SSL, if the sender desires to re-establish another new session with the same receiver, the both sides, for security consideration, should repeat the same key exchange and digital signature processes to generate a new session key. Apparently, the two processes must lower the communication system efficiency. Therefore, a new session key generation protocol is proposed to overcome this demerit. In our new model, the key exchange and digital signature process only perform once, and the subsequent session keys can be computed in both sides without the two processes. Because the two processes can be eliminated, our protocol can promote more performance than the current-used model.

[1]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[2]  Akihiro Shimizu,et al.  Simple And Secure password authentication protocol, ver.2(SAS-2) (メディア工学) , 2002 .

[3]  Chin-Chen Chang,et al.  A token free password authentication scheme with multiple key agreements , 2008, 2008 Third International Conference on Communications and Networking in China.

[4]  Chou Chen Yang,et al.  Cryptanalysis of improved authenticated multiple-key agreement protocol without using conventional one-way function , 2005, Appl. Math. Comput..

[5]  Matu-Tarow Noda,et al.  Simple and Secure Password Authentication Protocol (SAS) , 2000 .

[6]  Hung-Min Sun,et al.  Improved authenticated multiple-key agreement protocol , 2003 .

[7]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[8]  Zuhua Shao Security of robust generalized MQV key agreement protocol without using one-way hash functions , 2003, Comput. Stand. Interfaces.

[9]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[10]  Chin-Chen Chang,et al.  A Simple and Robust Authenticated Multiple Key Agreement Scheme , 2008, 2008 International Conference on Security Technology.

[11]  Jeong-Hyun Park,et al.  Key distribution for secure VSAT satellite communications , 1997, ISCE '97. Proceedings of 1997 IEEE International Symposium on Consumer Electronics (Cat. No.97TH8348).

[12]  Chien-Lung Hsu,et al.  Security of authenticated multiple-key agreement protocols , 1999 .

[13]  Kyung-Ah Shim,et al.  Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings , 2005, Appl. Math. Comput..

[14]  Marc Joye,et al.  Improved authenticated multiple-key agreement protocol , 1998 .

[15]  Lein Harn,et al.  Authenticated key agreement without using one-way hash functions , 2001 .