期刊文献+

T-IP: A Self-Trustworthy and Secure Internet Protocol

T-IP: A Self-Trustworthy and Secure Internet Protocol
下载PDF
导出
摘要 IPsec has become an important supplement of IP to provide security protection. However, the heavyweight IPsec has a high transmission overhead and latency, and it cannot provide the address accountability. We propose the self-trustworthy and secure Internet protocol(T-IP) for authenticated and encrypted network layer communications. T-IP has the following advantages:(1) Self-Trustworthy IP address.(2) Low connection latency and transmission overhead.(3) Reserving the important merit of IP to be stateless.(4) Compatible with the existing TCP/IP architecture. We theoretically prove the security of our shared secret key in T-IP and the resistance to the known session key attack of our security-enhanced shared secret key calculation. Moreover, we analyse the possibility of the application of T-IP, including its resilience against the man-in-the-middle attack and Do S attack. The evaluation shows that T-IP has a much lower transmission overhead and connection latency compared with IPsec. IPsec has become an important supplement of IP to provide security protec- tion. However, the heavyweight IPsec has a high transmission overhead and latency, and it cannot provide the address accountability. We propose the self-trustworthy and secure Internet protocol (T-IP) for authenticated and encrypted network layer communications. T-IP has the following advantages: (1) Self-Trust- worthy IP address. (2) Low connection latency and transmission overhead. (3) Reserving the important merit of IP to be stateless. (4) Com- patible with the existing TCP/IP architecture. We theoretically prove the security of our shared secret key in T-IP and the resistance to the known session key attack of our secu- rity-enhanced shared secret key calculation. Moreover, we analyse the possibility of the application of T-IP, including its resilience against the man-in-the-middle attack and DoS attack. The evaluation shows that T-IP has a much lower transmission overhead and con- nection latency compared with IPsec.
机构地区 School of Computer
出处 《China Communications》 SCIE CSCD 2018年第2期1-14,共14页 中国通信(英文版)
基金 supported by the national key research and development program under grant 2017YFB0802301 Guangxi cloud computing and large data Collaborative Innovation Center Project
关键词 identity-based cryptography self-trustworthy LIGHTWEIGHT low latency in-cremental deployment 因特网协议 安全关键 IPsec TCP/IP 传播 网络层 建筑学 攻击
  • 相关文献

参考文献1

二级参考文献22

  • 1Shamir A. Identity-based cryptosystems and signature schemes[C]. Advances in Cryptology-CRYPTO'84, Springer- Verlag, 1984: 47-53.
  • 2Boneh D and Franklin M. Identity-based encryption from the Well pairing[C]. Advances in Cryptology-CRYPTO'01, Springer-Verlag, 2001: 213-229.
  • 3Lewko A and Waters B. New techniques for dual system encryption and fully secure HIBE with short ciphertexts[C]. The Seventh Theory of Cryptography Conference(TCC'10), Springer-Verlag, 2010: 455-479.
  • 4Agrawal S, Boneh D, and Boyen X, Efficient lattice (H)IBE in the standard model[C]. Advances in Cryptology- EUROCRYPT'10, Springer-Verlag, 2010: 553-572.
  • 5Herranz J, Laguillaumie F, and Rhfols C. Constant size ciphertexts in threshold attribute-based encryption[C]. Public Key Cryptography-PKC 2010, Springer-Verlag, 2010: 19-34.
  • 6Zhou Z and Huang D. On efficient ciphertext-policy attribute based encryption and broadcast encryption[Z], http:// eprint.iacr.org/2010/395.2010.
  • 7Lewko A, Okamoto T, Sahai A, et al.. Fully secure functional encryption: attribute-based encryption and (Hierarchical) inner product encryption[C]. Advances in Cryptology- EUROCRYPT'10, Springer-Verlag, 2010: 62-91.
  • 8Yu S, Wang C, Ren K, et al.. Attribute based data sharing with attribute revocation [C]. ASIACCS'10: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, Beijing, China, 2010: 261-270.
  • 9Lewko A, Sahai A, and Waters B. Revocation systems with very small private keys[C]. IEEE Symposium on Security and Privacy, Los Alamitos, CA, USA, 2010: 273-285.
  • 10Goyal V, Pandey O, Sahai A, et al.. Attribute-based encryption for fine-grained access control of encrypted data[C]. CCS'06: Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, 2006: 89-98.

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部