A Secure and Efficient Protocol of Multiple Session Keys Generation
To negotiate a session key can benefit from the technique of the public-key cryptography such as key exchange and digital signature. This key cannot be used until the session is finished. In current model such as SSL, if the sender desires to re-establish another new session with the same receiver, the both sides, for security consideration, should repeat the same key exchange and digital signature processes to generate a new session key. Apparently, the two processes must lower the communication system efficiency. Therefore, a new session key generation protocol is proposed to overcome this demerit. In the authors' new model, the key exchange and digital signature process only perform once, and the subsequent session keys can be computed in both sides without the two processes.