2012
DOI: 10.1002/sec.536
|View full text |Cite
|
Sign up to set email alerts
|

Secure multicast key protocol for electronic mail systems with providing perfect forward secrecy

Abstract: Electronic mail (e-mail) systems are widely used in the Internet. A user usually needs to send an e-mail to a group of users. In this paper, a secure multicast key protocol for e-mail systems with providing perfect forward secrecy is proposed to ensure confidentiality and authentication of this kind of e-mail system. The protocol employs the Chinese Remainder Theorem, RSA public key cryptosystems, and one-way hash functions. The protocol can save redundant key materials used for the e-mails. Via the security a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 20 publications
(39 reference statements)
0
9
0
Order By: Relevance
“…The calculation of the rate of change in the number of pixels between the two cipher images or texts after changing one bit in the original key is undertaken by using the NPCR. On the other hand, the key space (2 n ) determined by the number of bits ( n ) used in the key, is a measure of robustness to brute force attacks .…”
Section: Methodsmentioning
confidence: 99%
“…The calculation of the rate of change in the number of pixels between the two cipher images or texts after changing one bit in the original key is undertaken by using the NPCR. On the other hand, the key space (2 n ) determined by the number of bits ( n ) used in the key, is a measure of robustness to brute force attacks .…”
Section: Methodsmentioning
confidence: 99%
“…In 2013, Zhang and Takagi [45] constructed an anonymous multireceiver encryption scheme and used the scheme to deploy a group e-mail systems. Chen [46] gave a multicast key protocol for e-mail systems that can provide forward secrecy.…”
Section: B Related Workmentioning
confidence: 99%
“…Despite many solutions (Chen et al 2014a, b;Chen 2013;Chen and Epa 2014;Loukas et al 2012) that are available now that provide the end-to-end (E2E) secure communications, most of them are using the classical ciphers, traditional symmetric cryptosystems and public key cryptography which are dealing with processing the secure communications among a variety of personal computers and server platforms, the solutions designed for MC are not suitable for H2H and secure MC group communication. However, several developments (Chen et al 2014b;Chen 2013;Chen and Epa 2014;Loukas et al 2012) provide these services, but none of them offers real utility security and preserve the privacy of the end-users. Because the human's memory is limited, participants always use the easily remembered word or memorable things as the secret password.…”
Section: Introductionmentioning
confidence: 98%
“…In recent years, data confidentiality, authentication, integrity, non-repudiation, access control, and availability are the most important security services in security criteria that should be taken into account in secure applications and systems (Chen et al 2014a, b;Chen 2013;Chen and Epa 2014;Loukas et al 2012;Chen and Christiana 2014;Chen and Chuang 2010a, b). However, there are no provisions for such security services in both MC and MCS.…”
Section: Introductionmentioning
confidence: 98%
See 1 more Smart Citation