File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Zero-configuration identity-based IP network encryptor

TitleZero-configuration identity-based IP network encryptor
Authors
KeywordsIdentity-based encryption (IBE)
Network encryptor
Supersingular curve
Tate pairing
Issue Date2010
PublisherIEEE.
Citation
Ieee Transactions On Consumer Electronics, 2010, v. 56 n. 2, p. 540-546 How to Cite?
AbstractFor corporations or individuals who wish to protect the confidentiality of their data across computer networks, network-layer encryption offers an efficient and proven method for preserving data privacy. Network layer encryption such as IPSec is more flexible than higher layer solutions since it is not application-dependent and can protect all end-to-end traffics that go between two hosts. Using IPSec, two hosts must first establish a session key through message exchanges before they can communicate. In this paper, we present an Identity Based Encryption (IBE) scheme that allows a host to calculate the per-packet encryption key based on the IP address of the destination host, without going through the expensive key exchange process as in IPSec. Our mechanism is compatible with the current IP protocol and we tested our scheme with live HTTP and ICMP traffic. Our results show that our protocol provides a zero-configuration network layer encryption solution for end-to-end secure communications that is ideal for consumer electronics applications. © 2006 IEEE.
Persistent Identifierhttp://hdl.handle.net/10722/124671
ISSN
2021 Impact Factor: 4.414
2020 SCImago Journal Rankings: 0.767
ISI Accession Number ID
References

 

DC FieldValueLanguage
dc.contributor.authorKwok, SHMen_HK
dc.contributor.authorSo, HKHen_HK
dc.contributor.authorLam, EYen_HK
dc.contributor.authorLui, KSen_HK
dc.date.accessioned2010-10-31T10:47:40Z-
dc.date.available2010-10-31T10:47:40Z-
dc.date.issued2010en_HK
dc.identifier.citationIeee Transactions On Consumer Electronics, 2010, v. 56 n. 2, p. 540-546en_HK
dc.identifier.issn0098-3063en_HK
dc.identifier.urihttp://hdl.handle.net/10722/124671-
dc.description.abstractFor corporations or individuals who wish to protect the confidentiality of their data across computer networks, network-layer encryption offers an efficient and proven method for preserving data privacy. Network layer encryption such as IPSec is more flexible than higher layer solutions since it is not application-dependent and can protect all end-to-end traffics that go between two hosts. Using IPSec, two hosts must first establish a session key through message exchanges before they can communicate. In this paper, we present an Identity Based Encryption (IBE) scheme that allows a host to calculate the per-packet encryption key based on the IP address of the destination host, without going through the expensive key exchange process as in IPSec. Our mechanism is compatible with the current IP protocol and we tested our scheme with live HTTP and ICMP traffic. Our results show that our protocol provides a zero-configuration network layer encryption solution for end-to-end secure communications that is ideal for consumer electronics applications. © 2006 IEEE.en_HK
dc.languageengen_HK
dc.publisherIEEE.-
dc.relation.ispartofIEEE Transactions on Consumer Electronicsen_HK
dc.rights©2010 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.-
dc.subjectIdentity-based encryption (IBE)en_HK
dc.subjectNetwork encryptoren_HK
dc.subjectSupersingular curveen_HK
dc.subjectTate pairingen_HK
dc.titleZero-configuration identity-based IP network encryptoren_HK
dc.typeArticleen_HK
dc.identifier.openurlhttp://library.hku.hk:4550/resserv?sid=HKU:IR&issn=0098-3063&volume=56&issue=2&spage=540&epage=546&date=2010&atitle=Zero-configuration+identity-based+IP+network+encryptor-
dc.identifier.emailSo, HKH:hso@eee.hku.hken_HK
dc.identifier.emailLam, EY:elam@eee.hku.hken_HK
dc.identifier.emailLui, KS:kslui@eee.hku.hken_HK
dc.identifier.authoritySo, HKH=rp00169en_HK
dc.identifier.authorityLam, EY=rp00131en_HK
dc.identifier.authorityLui, KS=rp00188en_HK
dc.description.naturepublished_or_final_version-
dc.identifier.doi10.1109/TCE.2010.5505967en_HK
dc.identifier.scopuseid_2-s2.0-77954743916en_HK
dc.identifier.hkuros171688en_HK
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-77954743916&selection=ref&src=s&origin=recordpageen_HK
dc.identifier.volume56en_HK
dc.identifier.issue2en_HK
dc.identifier.spage540en_HK
dc.identifier.epage546en_HK
dc.identifier.isiWOS:000281747600040-
dc.publisher.placeUnited Statesen_HK
dc.identifier.scopusauthoridKwok, SHM=36175807000en_HK
dc.identifier.scopusauthoridSo, HKH=10738896800en_HK
dc.identifier.scopusauthoridLam, EY=7102890004en_HK
dc.identifier.scopusauthoridLui, KS=7103390016en_HK
dc.identifier.issnl0098-3063-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats