Revisiting Shamir's No-key Protocol: Lightweight Key Transport
dc.authorid | Onur, Ertan/0000-0003-0514-5578 | |
dc.authorid | Onur, Cansu Betin/0000-0002-3691-1469 | |
dc.authorid | KILIC, Adnan/0000-0001-9325-4795 | |
dc.authorscopusid | 57202385650 | |
dc.authorscopusid | 7003500221 | |
dc.authorscopusid | 57561890900 | |
dc.authorwosid | Onur, Ertan/V-7360-2019 | |
dc.authorwosid | Onur, Cansu Betin/AAY-5136-2020 | |
dc.contributor.author | Kilic, Adnan | |
dc.contributor.author | Onur, Ertan | |
dc.contributor.author | Onur, Cansu Betin | |
dc.contributor.other | Mathematics | |
dc.date.accessioned | 2024-07-05T14:30:40Z | |
dc.date.available | 2024-07-05T14:30:40Z | |
dc.date.issued | 2017 | |
dc.department | Atılım University | en_US |
dc.department-temp | [Kilic, Adnan; Onur, Ertan] Middle East Tech Univ, Dept Comp Engn, Ankara, Turkey; [Onur, Cansu Betin] Atilim Univ, Dept Math, Ankara, Turkey | en_US |
dc.description | Onur, Ertan/0000-0003-0514-5578; Onur, Cansu Betin/0000-0002-3691-1469; KILIC, Adnan/0000-0001-9325-4795 | en_US |
dc.description.abstract | Key-transport protocols, subclasses of key-establishment protocols, are employed to convey secret keys from a principal to another for establishing a security association. In this paper, we propose a lightweight, practicable, tweakable, energy-efficient, and secure key-transport protocol, suitable for wireless sensor networks (WSN), Internet of Things (IoT) and mobile networks. The proposed protocol is based on the Shamir's no-key protocol. Although Shamir's no-key protocol does not require any pre-shared secret between principals, we show that it is impossible to employ the no-key protocol over public commutative groups. We modify Diffie-Hellman key-agreement protocol to morph it into a key-transport protocol by applying a set of changes on the original protocol and it becomes possible to compare both protocols in terms of memory usage and total time to accomplish a single key transport. The experimental results show that the proposed key transport protocol perform faster than the modified Diffie-Hellman protocol, and the total time to transport a single key by using the modified Diffie-Hellman protocol grows drastically with the increase in key size. | en_US |
dc.identifier.citation | 0 | |
dc.identifier.doi | 10.1109/DASC-PICom-DataCom-CyberSciTec.2017.103 | |
dc.identifier.endpage | 580 | en_US |
dc.identifier.isbn | 9781538619568 | |
dc.identifier.scopus | 2-s2.0-85048077022 | |
dc.identifier.startpage | 573 | en_US |
dc.identifier.uri | https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.103 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14411/595 | |
dc.identifier.wos | WOS:000942819400129 | |
dc.institutionauthor | Onur, Cansu Betin | |
dc.language.iso | en | en_US |
dc.publisher | Ieee Computer Soc | en_US |
dc.relation.ispartof | 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech) -- NOV 06-10, 2017 -- IEEE Tech Comm on Scalable Comp, Orlando, FL | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | [No Keyword Available] | en_US |
dc.title | Revisiting Shamir's No-key Protocol: Lightweight Key Transport | en_US |
dc.type | Conference Object | en_US |
dspace.entity.type | Publication | |
relation.isAuthorOfPublication | 665ba6b0-4e09-4188-8704-8386edff2b10 | |
relation.isAuthorOfPublication.latestForDiscovery | 665ba6b0-4e09-4188-8704-8386edff2b10 | |
relation.isOrgUnitOfPublication | 31ddeb89-24da-4427-917a-250e710b969c | |
relation.isOrgUnitOfPublication.latestForDiscovery | 31ddeb89-24da-4427-917a-250e710b969c |