ECIES PROTOCOL WITH ISSUER AUTHENTICATION

Authors

  • Renier Tejera Trujillo Complejo de Investigaciones Tecnológicas Integradas (CITI). 114, No. 11901, e/ Ciclovía & Rotonda, ISPJAE, Marianao, La Habana
  • Sacha Pelaiz Barranco Complejo de Investigaciones Tecnológicas Integradas (CITI). 114, No. 11901, e/ Ciclovía & Rotonda, ISPJAE, Marianao, La Habana

Keywords:

communication protocol, hybrid encryption scheme, key exchange protocol

Abstract

A hybrid encryption scheme is a cryptographic algorithm that can be built from two different phases: a key encapsulation mechanism (KEM) based on public key encryption, and a data encapsulation mechanism (DEM) based on a private key encryption scheme. The main advantage of hybrid cryptographic schemes is that they offer solutions to the problem of symmetric key exchange and the problem of efficiency typical of asymmetric encryption schemes. An example of a hybrid cryptographic algorithm is the Elliptic Curve Integrated Encryption Scheme (ECIES). ECIES is incorporated as international standard, however this protocol does not provide issuer authentication which is a drawback in many practical applications. This paper presents a secure, efficient and authenticated variant of ECIES protocol. The modification is based on the substitution of the mechanism for generating shared secret values included in the ECIES, for a one-pass authenticated key agreement protocol. This protocol is included in a cryptographic file-protection system which is used today in many practical applications and scenarios

Downloads

Download data is not yet available.

Downloads

Published

2023-04-28

How to Cite

Tejera Trujillo, R., & Pelaiz Barranco, S. (2023). ECIES PROTOCOL WITH ISSUER AUTHENTICATION. Investigación Operacional, 36(3). Retrieved from https://revistas.uh.cu/invoperacional/article/view/4595

Similar Articles

1 2 3 4 5 6 7 8 > >> 

You may also start an advanced similarity search for this article.