Privacy-enhanced Key Recovery in mobile communication environments

被引:0
作者
Park, Jong Hyuk [1 ]
机构
[1] Kyungnam Univ, Dept Comp Sci & Engn, Kyungnam, South Korea
关键词
Security; Privacy; Key Recovery; WAKE; Mobile communications; LOCATION INFORMATION; SYSTEMS;
D O I
10.1007/s11227-009-0287-4
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Generally, in mobile communication environments, Wireless Authentication and Key Establishment (WAKE) protocols are essential for secure information transmission. Key Recovery (KR) protocols, including WAKE protocols, can enable an authorized third party to gain access to encrypted message data under certain lawful circumstances. However, it is not easy to construct secure and strongly privacy-preserved KR protocols for mobile communication environments due to mobile hardware resources' limitation. In this paper, we propose a security-enhanced KR protocol and then we construct a privacy-enhanced KR protocol, which is based on the security-enhanced KR protocol, for protecting users' location privacy.
引用
收藏
页码:82 / 93
页数:12
相关论文
共 18 条
[1]  
ASKWITH B, 1997, 13 ANN COMP SEC APPL
[2]  
BLACK U, 1999, 2 GENERATION MOBILE
[3]  
BOWEN CL, 2007, INF ASS SEC WORKSH I, P175
[4]  
BUHANAL K, 1997, IEEE PERS COMMUN AUG
[5]   A taxonomy for key escrow encryption systems [J].
Denning, DE ;
Branstad, DK .
COMMUNICATIONS OF THE ACM, 1996, 39 (03) :34-39
[6]  
*ETSI TC STAG, 1996, 331 ETSI TCSTAT ETR
[7]  
FEDERRATH H, 1995, P IFIP TC 6 INT WORK, P105
[8]  
Horn G, 1998, LECT NOTES COMPUT SC, V1485, P277, DOI 10.1007/BFb0055870
[9]  
Kesdogan D, 1998, LECT NOTES COMPUT SC, V1485, P295, DOI 10.1007/BFb0055871
[10]  
KESDOGAN D, 1996, 12 IFIP INT C INF SE