메뉴 건너뛰기




Volumn 12, Issue 6, 2010, Pages 592-599

A highly secure identity-based authenticated key-exchange protocol for satellite communication

Author keywords

Authenticated key exchange (AKE); Computational diffie hellman (CDH) assumption; Extended canetti krawczyk (ECK) security; Identity based cryptography (IBC); Random oracle model; Satellite communication

Indexed keywords

GLOBAL POSITIONING SYSTEM; ORBITS; SATELLITE COMMUNICATION SYSTEMS; SATELLITES;

EID: 79251639172     PISSN: 12292370     EISSN: None     Source Type: Journal    
DOI: 10.1109/JCN.2010.6388306     Document Type: Article
Times cited : (28)

References (24)
  • 1
    • 33646588406 scopus 로고    scopus 로고
    • A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing
    • J. Warner and R. Johnston, "A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing," J. Security Admin., pp. 19-28, 2002.
    • (2002) J. Security Admin. , pp. 19-28
    • Warner, J.1    Johnston, R.2
  • 2
    • 85161666172 scopus 로고    scopus 로고
    • Acquisition and tracking of GIOVE-A broadcast L1/E5/E6 signals and analysis of DME/TACAN interference on receiver design
    • Geneva, Switzerland, May
    • G. X. Gao, D. Lorenzo, T. Walter, and P. Enge, "Acquisition and tracking of GIOVE-a broadcast L1/E5/E6 signals and analysis of DME/TACAN interference on receiver design," in Proc. ENC Global Navig. Satellite Syst. Conf, Geneva, Switzerland, May 2007.
    • (2007) Proc. ENC Global Navig. Satellite Syst. Conf
    • Gao, G.X.1    Lorenzo, D.2    Walter, T.3    Enge, P.4
  • 3
    • 34547991357 scopus 로고    scopus 로고
    • Galileo GIOVE-A broadcast E5 codes and their application to acquisition and tracking
    • San Diego, California, Jan.
    • G. X. Gao, D. Lorenzo, A. Chen, S. Lo, D. Akos, T. Walter, and P. Enge, "Galileo GIOVE-a broadcast E5 codes and their application to acquisition and tracking", ION Nat. Tech. Meeting, San Diego, California, Jan. 2007.
    • (2007) ION Nat. Tech. Meeting
    • Gao, G.X.1    Lorenzo, D.2    Chen, A.3    Lo, S.4    Akos, D.5    Walter, T.6    Enge, P.7
  • 5
    • 0001827537 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Berlin: Springer-Verlag
    • A. Shamir, "Identity-based cryptosystems and signature schemes." in Proc. Advances in Cryptology-Crypto, Berlin: Springer-Verlag, 1984, pp. 47-53.
    • (1984) Proc. Advances in Cryptology-Crypto , pp. 47-53
    • Shamir, A.1
  • 6
    • 0346857377 scopus 로고
    • An identity-based scheme providing zeroknowledge authentication and authenticated key exchange
    • Oct.
    • M. Girault and J. C. Pailles, "An identity-based scheme providing zeroknowledge authentication and authenticated key exchange," in Proc. European Symp. Research Comput. Security, Oct. 1990, pp. 173-184.
    • (1990) Proc. European Symp. Research Comput. Security , pp. 173-184
    • Girault, M.1    Pailles, J.C.2
  • 7
    • 1642383295 scopus 로고
    • An identity-based key exchange protocol
    • C. Gunther, "An identity-based key exchange protocol." in Proc. EUROCRYPT, 1989, pp. 29-37.
    • (1989) Proc. EUROCRYPT , pp. 29-37
    • Gunther, C.1
  • 8
    • 84964242030 scopus 로고
    • Distribution systems based on identification information
    • E. Okamoto, "Distribution systems based on identification information." In Proc. CRYPTO., vol. 293, 1987, pp. 194-202.
    • (1987) Proc. CRYPTO. , vol.293 , pp. 194-202
    • Okamoto, E.1
  • 9
    • 84942246351 scopus 로고    scopus 로고
    • Identity based authenticated key agreement protocols from pairings
    • L. Chen and C. Kudla, "Identity based authenticated key agreement protocols from pairings," in Proc. IEEE Comput. Security Found Workshop, 2003, pp. 219-233.
    • (2003) Proc. IEEE Comput. Security Found Workshop , pp. 219-233
    • Chen, L.1    Kudla, C.2
  • 10
    • 24144458508 scopus 로고    scopus 로고
    • A new two-party identity-based authenticated key agreement
    • N. McCullagh and P. S. L. M. Barreto, "A new two-party identity-based authenticated key agreement." in Proc. CT-RSA, 2005, pp. 262-274.
    • (2005) Proc. CT-RSA , pp. 262-274
    • McCullagh, N.1    Barreto, P.S.L.M.2
  • 11
    • 0037142442 scopus 로고    scopus 로고
    • Identity-based Authenticated key agreement protocol based on weil pairing
    • N. P. Smart, "Identity-based Authenticated key agreement protocol based on weil pairing," IET. Electron. Lett. vol. 38, no. 13, pp. 630-632, 2002.
    • (2002) IET. Electron. Lett. , vol.38 , Issue.13 , pp. 630-632
    • Smart, N.P.1
  • 14
    • 0031642585 scopus 로고    scopus 로고
    • A modular approach to the design and analysis of authentication and key exchange protocols
    • M. Bellare, R. Canetti, and H. Krawczyk, "A modular approach to the design and analysis of authentication and key exchange protocols", in Proc. ACM Symp. on Theory Comput., 1998, pp. 419-428.
    • (1998) Proc. ACM Symp. on Theory Comput. , pp. 419-428
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 15
    • 0017018484 scopus 로고
    • New directions in cryptography
    • W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol.22, no. 6, pp. 644-654, 1976.
    • (1976) IEEE Trans. Inf. Theory , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 16
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Springer-Verlag
    • R. Canetti and H. Krawczyk, "Analysis of key-exchange protocols and their use for building secure channels," Lecture Notes Comput. Sci., Springer-Verlag, vol. 2045, pp. 453-474, 2001
    • (2001) Lecture Notes Comput. Sci. , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 17
    • 34248229210 scopus 로고    scopus 로고
    • An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
    • R. W. Zhu, G. Yang, and D. S. Wong, "An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices," Theoretical Comput. Sci., pp. 198-207, 2007.
    • (2007) Theoretical Comput. Sci. , pp. 198-207
    • Zhu, R.W.1    Yang, G.2    Wong, D.S.3
  • 18
    • 0005078946 scopus 로고
    • Entity authentication and key distribution
    • M. Bellare and P. Rogaway, "Entity authentication and key distribution," in Proc. CRYPTO, 1993, pp. 232-249.
    • (1993) Proc. CRYPTO , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 19
    • 38149012093 scopus 로고    scopus 로고
    • Stronger security of authenticated key exchange
    • Heidelberg: Springer
    • B. LaMacchia, K. Lauter, and A. Mityagin, "Stronger security of authenticated key exchange," Lecture Notes Comput. Sci., vol. 4784, Heidelberg: Springer, pp. 1-16,2007.
    • (2007) Lecture Notes Comput. Sci. , vol.4784 , pp. 1-16
    • LaMacchia, B.1    Lauter, K.2    Mityagin, A.3
  • 20
    • 70350651474 scopus 로고    scopus 로고
    • A new strongly secure authenticated key exchange protocol
    • Q. Cheng, C. Ma, and X. Hu, "A new strongly secure authenticated key exchange protocol," in Proc. ISA, 2009, pp. 135-144
    • (2009) Proc. ISA , pp. 135-144
    • Cheng, Q.1    Ma, C.2    Hu, X.3
  • 21
    • 74049127185 scopus 로고    scopus 로고
    • A new efficient and strongly secure authenticated key exchange protocol
    • Q. Cheng, G. Han, and C. Ma, "A new efficient and strongly secure authenticated key exchange protocol," in Proc. ISA, 2009, pp. 499-502.
    • (2009) Proc. ISA , pp. 499-502
    • Cheng, Q.1    Han, G.2    Ma, C.3
  • 22
    • 74049161015 scopus 로고    scopus 로고
    • Strongly secure authenticated key exchange protocol based on computational Diffie-Hellman problem
    • Online. Available
    • H. Huang and Z. Cao. (2008). Strongly secure authenticated key exchange protocol based on computational Diffie-Hellman problem. Cryptology ePrint Archive. [Online]. Available: http://eprint.iacr.org/2008/500
    • (2008) Cryptology EPrint Archive
    • Huang, H.1    Cao, Z.2
  • 23
    • 74049129404 scopus 로고    scopus 로고
    • An efficient authenticated key exchange protocol with a tight security reduction
    • Online. Available
    • J. Lee and C. S. Park. (2008). An efficient authenticated key exchange protocol with a tight security reduction. Cryptology ePrint Archive. [Online]. Available: http://eprint.iacr.org/2008/345.pdfl
    • (2008) Cryptology EPrint Archive
    • Lee, J.1    Park, C.S.2
  • 24
    • 74049129404 scopus 로고    scopus 로고
    • Authenticated key exchange secure under the computational Diffie-Hellman assumption
    • Online. Available
    • J. Lee and J. H. Park. (2008). Authenticated key exchange secure under the computational Diffie-Hellman assumption. Cryptology ePrint Archive. [Online]. Available: http://eprint.iacr.org/2008/344.pdfl
    • (2008) Cryptology EPrint Archive
    • Lee, J.1    Park, J.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.