Revisiting Shamir's No-key Protocol: Lightweight Key Transport

dc.authorid Onur, Ertan/0000-0003-0514-5578
dc.authorid Onur, Cansu Betin/0000-0002-3691-1469
dc.authorid KILIC, Adnan/0000-0001-9325-4795
dc.authorscopusid 57202385650
dc.authorscopusid 7003500221
dc.authorscopusid 57561890900
dc.authorwosid Onur, Ertan/V-7360-2019
dc.authorwosid Onur, Cansu Betin/AAY-5136-2020
dc.contributor.author Kilic, Adnan
dc.contributor.author Onur, Ertan
dc.contributor.author Onur, Cansu Betin
dc.contributor.other Mathematics
dc.date.accessioned 2024-07-05T14:30:40Z
dc.date.available 2024-07-05T14:30:40Z
dc.date.issued 2017
dc.department Atılım University en_US
dc.department-temp [Kilic, Adnan; Onur, Ertan] Middle East Tech Univ, Dept Comp Engn, Ankara, Turkey; [Onur, Cansu Betin] Atilim Univ, Dept Math, Ankara, Turkey en_US
dc.description Onur, Ertan/0000-0003-0514-5578; Onur, Cansu Betin/0000-0002-3691-1469; KILIC, Adnan/0000-0001-9325-4795 en_US
dc.description.abstract Key-transport protocols, subclasses of key-establishment protocols, are employed to convey secret keys from a principal to another for establishing a security association. In this paper, we propose a lightweight, practicable, tweakable, energy-efficient, and secure key-transport protocol, suitable for wireless sensor networks (WSN), Internet of Things (IoT) and mobile networks. The proposed protocol is based on the Shamir's no-key protocol. Although Shamir's no-key protocol does not require any pre-shared secret between principals, we show that it is impossible to employ the no-key protocol over public commutative groups. We modify Diffie-Hellman key-agreement protocol to morph it into a key-transport protocol by applying a set of changes on the original protocol and it becomes possible to compare both protocols in terms of memory usage and total time to accomplish a single key transport. The experimental results show that the proposed key transport protocol perform faster than the modified Diffie-Hellman protocol, and the total time to transport a single key by using the modified Diffie-Hellman protocol grows drastically with the increase in key size. en_US
dc.identifier.citationcount 0
dc.identifier.doi 10.1109/DASC-PICom-DataCom-CyberSciTec.2017.103
dc.identifier.endpage 580 en_US
dc.identifier.isbn 9781538619568
dc.identifier.scopus 2-s2.0-85048077022
dc.identifier.startpage 573 en_US
dc.identifier.uri https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.103
dc.identifier.uri https://hdl.handle.net/20.500.14411/595
dc.identifier.wos WOS:000942819400129
dc.institutionauthor Onur, Cansu Betin
dc.language.iso en en_US
dc.publisher Ieee Computer Soc en_US
dc.relation.ispartof 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech) -- NOV 06-10, 2017 -- IEEE Tech Comm on Scalable Comp, Orlando, FL en_US
dc.relation.publicationcategory Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı en_US
dc.rights info:eu-repo/semantics/closedAccess en_US
dc.scopus.citedbyCount 0
dc.subject [No Keyword Available] en_US
dc.title Revisiting Shamir's No-key Protocol: Lightweight Key Transport en_US
dc.type Conference Object en_US
dc.wos.citedbyCount 0
dspace.entity.type Publication
relation.isAuthorOfPublication 665ba6b0-4e09-4188-8704-8386edff2b10
relation.isAuthorOfPublication.latestForDiscovery 665ba6b0-4e09-4188-8704-8386edff2b10
relation.isOrgUnitOfPublication 31ddeb89-24da-4427-917a-250e710b969c
relation.isOrgUnitOfPublication.latestForDiscovery 31ddeb89-24da-4427-917a-250e710b969c

Files

Collections