TY - GEN
T1 - Enhanced privacy in key-exchange protocols by one-time ID
AU - Imamoto, Kenji
AU - Sakurai, Kouichi
PY - 2006/12/1
Y1 - 2006/12/1
N2 - This paper considers how two parties communicate securely over an adversary-controlled network. We especially focus on the problem of ID protection because of the recently rapid development of mobile network where any transferred message is easily eavesdropped on. We analyze several existing key exchange protocols and point out their problems: e.g. incompleteness of ID protection and vulnerability to DoS attacks. Then we model the notion of ID protection and construct a protocol with provable security.
AB - This paper considers how two parties communicate securely over an adversary-controlled network. We especially focus on the problem of ID protection because of the recently rapid development of mobile network where any transferred message is easily eavesdropped on. We analyze several existing key exchange protocols and point out their problems: e.g. incompleteness of ID protection and vulnerability to DoS attacks. Then we model the notion of ID protection and construct a protocol with provable security.
UR - http://www.scopus.com/inward/record.url?scp=33845920721&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33845920721&partnerID=8YFLogxK
U2 - 10.1109/SECPERU.2006.9
DO - 10.1109/SECPERU.2006.9
M3 - Conference contribution
AN - SCOPUS:33845920721
SN - 0769525490
SN - 9780769525495
T3 - Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006
SP - 63
EP - 68
BT - Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006
T2 - 2nd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006
Y2 - 29 June 2006 through 29 June 2006
ER -