Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Strong password-only authenticated key exchange
ACM SIGCOMM Computer Communication Review
The random oracle methodology, revisited (preliminary version)
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Simple and fault-tolerant key agreement for dynamic collaborative groups
Proceedings of the 7th ACM conference on Computer and communications security
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Secure communications over insecure channels based on short authenticated strings
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Ephemeral pairing on anonymous networks
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
A protocol for wide area secure networked appliance communication
IEEE Communications Magazine
Home networking with Universal Plug and Play
IEEE Communications Magazine
The Open Services Gateway Initiative: an introductory overview
IEEE Communications Magazine
Hi-index | 0.00 |
This paper describes the key management method which allows secure communication channels between devices in home networks. Home network technologies have developed to enable various kinds of home devices to access the digital information between the devices. Without security framework, however, the digital information including a user's private data may be exposed to a malicious attacker. Although conventional public key cryptosystems generally provide security features such as confidentiality and integrity, the distribution of the keys is vulnerable to man-in-the-middle attack without a trusted third party. In general home networks are dynamically set up without relying on any pre-existing infrastructure or central administration. Therefore, we must implement key distribution schemes without the assumption of a trusted third party. In this paper, we present self-authorized public key management for home networks. Our idea is to bind the device owner's authorization information to the public key of a device. Our protocol enables the distribution of the authenticated public key using an identity-based encryption scheme. We also provide heuristic analysis of various security properties.