메뉴 건너뛰기




Volumn 50, Issue 1, 2007, Pages 41-52

A secure authenticated group key agreement protocol for resource-limited mobile devices

Author keywords

Contributory group key agreement; Mobile device; Provably secure; Resource limited; Security

Indexed keywords

COMPUTER SIMULATION; MOBILE TELECOMMUNICATION SYSTEMS; SECURITY OF DATA; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 33845653685     PISSN: 00104620     EISSN: 14602067     Source Type: Journal    
DOI: 10.1093/comjnl/bxl043     Document Type: Article
Times cited : (39)

References (42)
  • 1
    • 33845639580 scopus 로고    scopus 로고
    • ETSI TS-123-060 General Packet Radio Services (GPRS) Service Description (Stage 2)., European Telecommunications Standards Institute ETSI TS-123-060, Sophia Antipolis Cedex, France
    • ETSI TS-123-060 (2002) General Packet Radio Services (GPRS) Service Description (Stage 2)., European Telecommunications Standards Institute ETSI TS-123-060, Sophia Antipolis Cedex, France.
    • (2002)
  • 2
    • 33845652596 scopus 로고    scopus 로고
    • Wireless LAN media access control (MAC) and physical layer (PHY) specifications
    • ANSI/EEEE Std. 802.11 ANSI/EEEE Std. 802.11 (E) ISO/EEC 8802-11, EEEE Standards Association, Piscataway, USA
    • ANSI/EEEE Std. 802.11 (1999) Wireless LAN media access control (MAC) and physical layer (PHY) specifications. ANSI/EEEE Std. 802.11 (E) Part 11, ISO/EEC 8802-11, EEEE Standards Association, Piscataway, USA.
    • (1999) , Issue.PART 11
  • 3
    • 1842815887 scopus 로고    scopus 로고
    • Security in mobile ad hoc networks: Challenges and solutions
    • Yang, H., Luo, H., Ye, F., Lu, S. and Zhang, L. (2004) Security in mobile ad hoc networks: Challenges and solutions. IEEE Wireless Commun., 11, 38-47.
    • (2004) IEEE Wireless Commun. , vol.11 , pp. 38-47
    • Yang, H.1    Luo, H.2    Ye, F.3    Lu, S.4    Zhang, L.5
  • 4
    • 13244255382 scopus 로고    scopus 로고
    • Peer-to-Peer Security in Mobile Devices: A User Perspective
    • In Zurich, Switzerland, August 15-17, IEEE Press, NJ
    • Campadello, S. (2004) Peer-to-Peer Security in Mobile Devices: A User Perspective. In Proc. Fourth Int. Conf. Peer-to-Peer Computing (P2P'04), Zurich, Switzerland, August 15-17, pp. 252-257. IEEE Press, NJ.
    • (2004) Proc. Fourth Int. Conf. Peer-to-Peer Computing (P2P'04) , pp. 252-257
    • Campadello, S.1
  • 5
    • 0036949030 scopus 로고    scopus 로고
    • Challenge: Integrating mobile wireless devices into the computational grid
    • Atlanta, Georgia, USA, September 23-28
    • Phan, T., Huang, L. and Dulan, C. (2002) Challenge: Integrating mobile wireless devices into the computational grid. MobiCom'02, Atlanta, Georgia, USA, September 23-28, pp. 271-278.
    • (2002) MobiCom'02 , pp. 271-278
    • Phan, T.1    Huang, L.2    Dulan, C.3
  • 7
    • 0029256120 scopus 로고
    • Conference key distribution schemes for secure digital mobile communications
    • Hwang, M. S. and Yang, W. P. (1995) Conference key distribution schemes for secure digital mobile communications. IEEE J. Sel. Areas Comm., 13, 416-420.
    • (1995) IEEE J. Sel. Areas Comm. , vol.13 , pp. 416-420
    • Hwang, M.S.1    Yang, W.P.2
  • 8
    • 0347309397 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of key distribution system for VS AT satellite communication
    • Tseng, Y. M. (2002) Cryptanalysis and improvement of key distribution system for VS AT satellite communication. Int. J. Informatica, 13, 369-376.
    • (2002) Int. J. Informatica , vol.13 , pp. 369-376
    • Tseng, Y.M.1
  • 9
    • 0032629876 scopus 로고    scopus 로고
    • Anonymous conference key distribution systems based on the discrete logarithm problem
    • Tseng, Y. M. and Jan, J. K. (1999) Anonymous conference key distribution systems based on the discrete logarithm problem. Comput. Commun., 22, 749-754.
    • (1999) Comput. Commun. , vol.22 , pp. 749-754
    • Tseng, Y.M.1    Jan, J.K.2
  • 11
    • 84948991087 scopus 로고
    • A secure and efficient conference key distribution system
    • In Perugia, Italy, May 9-12, LNCS, 950, Springer-Verlag, Berlin
    • Burmester, M. and Desmedt, Y. (1994) A secure and efficient conference key distribution system. In Advances in Cryptology - Proceedings of Eurocrypt'94, Perugia, Italy, May 9-12, LNCS, 950, pp. 275-286. Springer-Verlag, Berlin.
    • (1994) Advances in Cryptology - Proceedings of Eurocrypt'94 , pp. 275-286
    • Burmester, M.1    Desmedt, Y.2
  • 12
    • 0033748607 scopus 로고    scopus 로고
    • New multi-party authentication services and key agreement protocols
    • Ateniese, G., Steiner, M. and Tsudik, G. (2000) New multi-party authentication services and key agreement protocols. IEEE J. Sel. Areas Comm., 18, 628-639.
    • (2000) IEEE J. Sel. Areas Comm. , vol.18 , pp. 628-639
    • Ateniese, G.1    Steiner, M.2    Tsudik, G.3
  • 14
    • 50849092893 scopus 로고    scopus 로고
    • Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions
    • In Amsterdam, The Netherlands, April 28 May 2, LNCS 2332, Springer-Verlag, Berlin
    • Bresson, E., Chevassut, O. and Pointcheval, D. (2002) Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions. In Proc. Eurocrypt 2002, Amsterdam, The Netherlands, April 28 May 2, LNCS 2332, pp. 321-336. Springer-Verlag, Berlin.
    • (2002) Proc. Eurocrypt 2002 , pp. 321-336
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 15
    • 35248878854 scopus 로고    scopus 로고
    • Scalable Protocols for Authenticated Group Key Exchange
    • Santa Barbara, CA, August 17-21, LNCS 2729
    • Katz, J. and Yung, M. (2003) Scalable Protocols for Authenticated Group Key Exchange. Advances in Cryptology-Proceedings of Crypto'03, Santa Barbara, CA, August 17-21, pp. 110-125, LNCS 2729.
    • (2003) Advances in Cryptology-Proceedings of Crypto'03 , pp. 110-125
    • Katz, J.1    Yung, M.2
  • 16
    • 25844432081 scopus 로고    scopus 로고
    • A robust multi-party key agreement protocol resistant to malicious participants
    • Tseng, Y. M. (2005) A robust multi-party key agreement protocol resistant to malicious participants. Comput J., 48, 480-487.
    • (2005) Comput J. , vol.48 , pp. 480-487
    • Tseng, Y.M.1
  • 17
    • 0034822650 scopus 로고    scopus 로고
    • A security analysis of the cliques protocol suites
    • In Cape Breton, Nova Scotia, Canada, June 11-13, IEEE Press, NJ
    • Pereira, O. and Quisquater, J. J. (2001) A security analysis of the cliques protocol suites. In Proc. 14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada, June 11-13, pp. 73-81. IEEE Press, NJ.
    • (2001) Proc. 14th IEEE Computer Security Foundations Workshop , pp. 73-81
    • Pereira, O.1    Quisquater, J.J.2
  • 18
    • 0034317075 scopus 로고    scopus 로고
    • Key agreement in ad hoc networks
    • Asokan, N. and Ginzboorg, P. (2000) Key agreement in ad hoc networks. Comput. Commun., 23, 1627-1637.
    • (2000) Comput. Commun. , vol.23 , pp. 1627-1637
    • Asokan, N.1    Ginzboorg, P.2
  • 19
    • 35248878662 scopus 로고    scopus 로고
    • Round-optimal contributory conference key agreement
    • In Miami, USA, January 6-8, LNCS 2567, Springer-Verlag, Berlin
    • Boyd, C. and Nieto, G. (2003) Round-optimal contributory conference key agreement. In Proc. Public-Key Cryptography'03, Miami, USA, January 6-8, LNCS 2567, pp. 161-174. Springer-Verlag, Berlin.
    • (2003) Proc. Public-Key Cryptography'03 , pp. 161-174
    • Boyd, C.1    Nieto, G.2
  • 20
  • 21
    • 0036643547 scopus 로고    scopus 로고
    • Robust generalized MQV key agreement protocol without using one-way hash functions
    • Tseng, Y. M. (2002) Robust generalized MQV key agreement protocol without using one-way hash functions. Comput. Stand. Interface, 24, 241-246.
    • (2002) Comput. Stand. Interface , vol.24 , pp. 241-246
    • Tseng, Y.M.1
  • 22
    • 4544386246 scopus 로고    scopus 로고
    • Multual authentication and group key agreement for low-power mobile devices
    • Bresson, E., Chevassut, O., Essiari, A. and Pointcheval, D. (2004) Multual authentication and group key agreement for low-power mobile devices. Comput. Commun., 27, 1730-1737.
    • (2004) Comput. Commun. , vol.27 , pp. 1730-1737
    • Bresson, E.1    Chevassut, O.2    Essiari, A.3    Pointcheval, D.4
  • 23
    • 19644371756 scopus 로고    scopus 로고
    • A weakness in the Bresson-Chevassut-Essiari-Pointcheval's group key agreement scheme for low-power mobile devices
    • Nam, J., Kim, S. and Won, D. (2005) A weakness in the Bresson-Chevassut-Essiari-Pointcheval's group key agreement scheme for low-power mobile devices. IEEE Commun. Lett., 9, 429-431.
    • (2005) IEEE Commun. Lett. , vol.9 , pp. 429-431
    • Nam, J.1    Kim, S.2    Won, D.3
  • 24
    • 19744369256 scopus 로고    scopus 로고
    • DDH-based group key agreement in a mobile environment
    • Nam, J., Kim, S. and Won, D. (2005) DDH-based group key agreement in a mobile environment. J. Syst. Software, 78, 73-83.
    • (2005) J. Syst. Software , vol.78 , pp. 73-83
    • Nam, J.1    Kim, S.2    Won, D.3
  • 25
    • 33845682890 scopus 로고    scopus 로고
    • On the security of two group key agreement protocols for mobile devices
    • In Nara, Japan, May 9-12, IEEE Press, NJ
    • Tseng, Y. M. (2006) On the security of two group key agreement protocols for mobile devices. In Int Workshop on Future Mobile and Ubiquitous Information Technologies (FMUIT2006), Nara, Japan, May 9-12, pp. 59-62. IEEE Press, NJ.
    • (2006) Int Workshop on Future Mobile and Ubiquitous Information Technologies (FMUIT2006) , pp. 59-62
    • Tseng, Y.M.1
  • 27
    • 84947778144 scopus 로고    scopus 로고
    • The decision Diffie-Hellman problem
    • In Portland, Oregon, June 21-25, LNCS 1423, Springer-Verlag, Berlin
    • Boneh, D. (1998) The decision Diffie-Hellman problem. In Proc. 3rd Algorithmic Number Theorey Symp., Portland, Oregon, June 21-25, LNCS 1423, pp. 48-63. Springer-Verlag, Berlin.
    • (1998) Proc. 3rd Algorithmic Number Theorey Symp. , pp. 48-63
    • Boneh, D.1
  • 28
    • 84942550160 scopus 로고    scopus 로고
    • Lower bounds for discrete logarithms and related problems
    • In Konstanz, Germany, May 11-15, LNCS 1233, Springer-Verlag, Berlin
    • Shoup, V. (1997) Lower bounds for discrete logarithms and related problems. In Advances in Cryptology - Proc. Eurocrypt'97, Konstanz, Germany, May 11-15, LNCS 1233, pp. 256-266. Springer-Verlag, Berlin.
    • (1997) Advances in Cryptology - Proc. Eurocrypt'97 , pp. 256-266
    • Shoup, V.1
  • 29
    • 33845610504 scopus 로고    scopus 로고
    • Secure Hash Standard (SHS)
    • NIST/NSA FIPS 180-2 NIST/NSA, Gaithersburg, MD, USA
    • NIST/NSA FIPS 180-2 (2005) Secure Hash Standard (SHS). NIST/NSA, Gaithersburg, MD, USA.
    • (2005)
  • 30
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • ELGamal, T. (1985) A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory, 31, 469-472.
    • (1985) IEEE Trans. Inform. Theory , vol.31 , pp. 469-472
    • ELGamal, T.1
  • 31
    • 84936033986 scopus 로고
    • The Digital Signature Standard (DSA)
    • NIST
    • NIST (1992) The Digital Signature Standard (DSA). Commun. ACM, 35, 36-40.
    • (1992) Commun. ACM , vol.35 , pp. 36-40
  • 32
    • 84880883264 scopus 로고    scopus 로고
    • Improved on-line/off-line signature schemes
    • In Santa Barbara, CA, August 19-23, LNCS 2139, Springer-Verlag, Berlin
    • Shamir, A. and Tauman, Y. (2001) Improved on-line/off-line signature schemes. In Proc. Advances in Cryptology-Crypto'01, Santa Barbara, CA, August 19-23, LNCS 2139, pp. 355-367. Springer-Verlag, Berlin.
    • (2001) Proc. Advances in Cryptology-Crypto'01 , pp. 355-367
    • Shamir, A.1    Tauman, Y.2
  • 34
    • 33845651723 scopus 로고    scopus 로고
    • 3GPP TS 33.102 3GPP Technical Specification Group Services and System Aspects; 3G Security; Security architecture (Release 6). 3GPP Technical Specification Group, Valbonne, France
    • 3GPP TS 33.102 (2003) 3GPP Technical Specification Group Services and System Aspects; 3G Security; Security architecture (Release 6). 3GPP Technical Specification Group, Valbonne, France.
    • (2003)
  • 35
    • 0242508595 scopus 로고    scopus 로고
    • EAP AKA Authentication. draft-arkko-pppext-eap-aka-11
    • The Internet Engineering Task Force (IETF), VA, USA
    • Arkko, J. and Haverinen, H. (2003) EAP AKA Authentication. draft-arkko-pppext-eap-aka-11. The Internet Engineering Task Force (IETF), VA, USA.
    • (2003)
    • Arkko, J.1    Haverinen, H.2
  • 36
    • 9144267125 scopus 로고    scopus 로고
    • Authentication and Billing Protocols for the Integration of WLAN and 3G Networks
    • Tseng, Y. M., Yang, C. C. and Su, J. H. (2004) Authentication and Billing Protocols for the Integration of WLAN and 3G Networks. Wireless Pers. Commun., 29, 351-366.
    • (2004) Wireless Pers. Commun. , vol.29 , pp. 351-366
    • Tseng, Y.M.1    Yang, C.C.2    Su, J.H.3
  • 37
    • 84907506045 scopus 로고    scopus 로고
    • Experiments in wireless internet security
    • In Orlando, Florida, March 17-21, IEEE Press, NJ
    • Gupta, V. and Gupta, S. (2002) Experiments in wireless internet security. In Proc. IEEE Wireless Communications and Networking Conf. (WCNC), Orlando, Florida, March 17-21, pp. 859-863. IEEE Press, NJ.
    • (2002) Proc. IEEE Wireless Communications and Networking Conf. (WCNC) , pp. 859-863
    • Gupta, V.1    Gupta, S.2
  • 38
    • 33845656812 scopus 로고    scopus 로고
    • ASUS MyPal A620 PDA. Available at
    • ASUS (2003) MyPal A620 PDA. Available at: http://www.mobiletechreview.com/asus_mypal_A620.htm.
    • (2003)
  • 39
    • 33845655946 scopus 로고    scopus 로고
    • Microsoft Pocket PC 2003., Available at
    • Microsoft (2003) Pocket PC 2003., Available at: http://www.microsoft.com/windowsmobile/default.mspx.
    • (2003)
  • 40
    • 33845616684 scopus 로고    scopus 로고
    • Ewesoft Software Development Kit (SDK). Available at
    • Ewesoft (2005) Software Development Kit (SDK). Available at: http://www.ewesoft.com/.
    • (2005)
  • 41
    • 85180529073 scopus 로고    scopus 로고
    • Speeding up secure web transactions using elliptic curve cryptography
    • In California, February 5-6, Internet Soceity (ISOC), VA, USA
    • Gupta, V., Stebila, D. and Fung, S. (2004) Speeding up secure web transactions using elliptic curve cryptography. In Proc. 11th Network and Distributed Systems Security Symp., California, February 5-6, pp. 231-239. Internet Soceity (ISOC), VA, USA.
    • (2004) Proc. 11th Network and Distributed Systems Security Symp. , pp. 231-239
    • Gupta, V.1    Stebila, D.2    Fung, S.3
  • 42
    • 0038443119 scopus 로고    scopus 로고
    • Next generation security for wireless: Elliptic curve cryptography
    • Vanstone, S. A. (2003) Next generation security for wireless: Elliptic curve cryptography. Comput. Secur., 22, 412-415.
    • (2003) Comput. Secur. , vol.22 , pp. 412-415
    • Vanstone, S.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.