File Download
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/TCE.2010.5505967
- Scopus: eid_2-s2.0-77954743916
- WOS: WOS:000281747600040
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Zero-configuration identity-based IP network encryptor
Title | Zero-configuration identity-based IP network encryptor |
---|---|
Authors | |
Keywords | Identity-based encryption (IBE) Network encryptor Supersingular curve Tate pairing |
Issue Date | 2010 |
Publisher | IEEE. |
Citation | Ieee Transactions On Consumer Electronics, 2010, v. 56 n. 2, p. 540-546 How to Cite? |
Abstract | For corporations or individuals who wish to protect the confidentiality of their data across computer networks, network-layer encryption offers an efficient and proven method for preserving data privacy. Network layer encryption such as IPSec is more flexible than higher layer solutions since it is not application-dependent and can protect all end-to-end traffics that go between two hosts. Using IPSec, two hosts must first establish a session key through message exchanges before they can communicate. In this paper, we present an Identity Based Encryption (IBE) scheme that allows a host to calculate the per-packet encryption key based on the IP address of the destination host, without going through the expensive key exchange process as in IPSec. Our mechanism is compatible with the current IP protocol and we tested our scheme with live HTTP and ICMP traffic. Our results show that our protocol provides a zero-configuration network layer encryption solution for end-to-end secure communications that is ideal for consumer electronics applications. © 2006 IEEE. |
Persistent Identifier | http://hdl.handle.net/10722/124671 |
ISSN | 2023 Impact Factor: 4.3 2023 SCImago Journal Rankings: 1.298 |
ISI Accession Number ID | |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kwok, SHM | en_HK |
dc.contributor.author | So, HKH | en_HK |
dc.contributor.author | Lam, EY | en_HK |
dc.contributor.author | Lui, KS | en_HK |
dc.date.accessioned | 2010-10-31T10:47:40Z | - |
dc.date.available | 2010-10-31T10:47:40Z | - |
dc.date.issued | 2010 | en_HK |
dc.identifier.citation | Ieee Transactions On Consumer Electronics, 2010, v. 56 n. 2, p. 540-546 | en_HK |
dc.identifier.issn | 0098-3063 | en_HK |
dc.identifier.uri | http://hdl.handle.net/10722/124671 | - |
dc.description.abstract | For corporations or individuals who wish to protect the confidentiality of their data across computer networks, network-layer encryption offers an efficient and proven method for preserving data privacy. Network layer encryption such as IPSec is more flexible than higher layer solutions since it is not application-dependent and can protect all end-to-end traffics that go between two hosts. Using IPSec, two hosts must first establish a session key through message exchanges before they can communicate. In this paper, we present an Identity Based Encryption (IBE) scheme that allows a host to calculate the per-packet encryption key based on the IP address of the destination host, without going through the expensive key exchange process as in IPSec. Our mechanism is compatible with the current IP protocol and we tested our scheme with live HTTP and ICMP traffic. Our results show that our protocol provides a zero-configuration network layer encryption solution for end-to-end secure communications that is ideal for consumer electronics applications. © 2006 IEEE. | en_HK |
dc.language | eng | en_HK |
dc.publisher | IEEE. | - |
dc.relation.ispartof | IEEE Transactions on Consumer Electronics | en_HK |
dc.rights | ©2010 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. | - |
dc.subject | Identity-based encryption (IBE) | en_HK |
dc.subject | Network encryptor | en_HK |
dc.subject | Supersingular curve | en_HK |
dc.subject | Tate pairing | en_HK |
dc.title | Zero-configuration identity-based IP network encryptor | en_HK |
dc.type | Article | en_HK |
dc.identifier.openurl | http://library.hku.hk:4550/resserv?sid=HKU:IR&issn=0098-3063&volume=56&issue=2&spage=540&epage=546&date=2010&atitle=Zero-configuration+identity-based+IP+network+encryptor | - |
dc.identifier.email | So, HKH:hso@eee.hku.hk | en_HK |
dc.identifier.email | Lam, EY:elam@eee.hku.hk | en_HK |
dc.identifier.email | Lui, KS:kslui@eee.hku.hk | en_HK |
dc.identifier.authority | So, HKH=rp00169 | en_HK |
dc.identifier.authority | Lam, EY=rp00131 | en_HK |
dc.identifier.authority | Lui, KS=rp00188 | en_HK |
dc.description.nature | published_or_final_version | - |
dc.identifier.doi | 10.1109/TCE.2010.5505967 | en_HK |
dc.identifier.scopus | eid_2-s2.0-77954743916 | en_HK |
dc.identifier.hkuros | 171688 | en_HK |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-77954743916&selection=ref&src=s&origin=recordpage | en_HK |
dc.identifier.volume | 56 | en_HK |
dc.identifier.issue | 2 | en_HK |
dc.identifier.spage | 540 | en_HK |
dc.identifier.epage | 546 | en_HK |
dc.identifier.isi | WOS:000281747600040 | - |
dc.publisher.place | United States | en_HK |
dc.identifier.scopusauthorid | Kwok, SHM=36175807000 | en_HK |
dc.identifier.scopusauthorid | So, HKH=10738896800 | en_HK |
dc.identifier.scopusauthorid | Lam, EY=7102890004 | en_HK |
dc.identifier.scopusauthorid | Lui, KS=7103390016 | en_HK |
dc.identifier.issnl | 0098-3063 | - |