Enhanced privacy in key-exchange protocols by one-time ID

Kenji Imamoto, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper considers how two parties communicate securely over an adversary-controlled network. We especially focus on the problem of ID protection because of the recently rapid development of mobile network where any transferred message is easily eavesdropped on. We analyze several existing key exchange protocols and point out their problems: e.g. incompleteness of ID protection and vulnerability to DoS attacks. Then we model the notion of ID protection and construct a protocol with provable security.

Original languageEnglish
Title of host publicationProceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006
Pages63-68
Number of pages6
DOIs
Publication statusPublished - Dec 1 2006
Event2nd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006 - Lyon, France
Duration: Jun 29 2006Jun 29 2006

Publication series

NameProceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006
Volume2006

Other

Other2nd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006
CountryFrance
CityLyon
Period6/29/066/29/06

Fingerprint

Network protocols
Wireless networks
Denial-of-service attack

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Cite this

Imamoto, K., & Sakurai, K. (2006). Enhanced privacy in key-exchange protocols by one-time ID. In Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006 (pp. 63-68). [1644279] (Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006; Vol. 2006). https://doi.org/10.1109/SECPERU.2006.9

Enhanced privacy in key-exchange protocols by one-time ID. / Imamoto, Kenji; Sakurai, Kouichi.

Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006. 2006. p. 63-68 1644279 (Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006; Vol. 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Imamoto, K & Sakurai, K 2006, Enhanced privacy in key-exchange protocols by one-time ID. in Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006., 1644279, Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006, vol. 2006, pp. 63-68, 2nd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006, Lyon, France, 6/29/06. https://doi.org/10.1109/SECPERU.2006.9
Imamoto K, Sakurai K. Enhanced privacy in key-exchange protocols by one-time ID. In Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006. 2006. p. 63-68. 1644279. (Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006). https://doi.org/10.1109/SECPERU.2006.9
Imamoto, Kenji ; Sakurai, Kouichi. / Enhanced privacy in key-exchange protocols by one-time ID. Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006. 2006. pp. 63-68 (Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006).
@inproceedings{970d18b67be742acb9c8960f804e335b,
title = "Enhanced privacy in key-exchange protocols by one-time ID",
abstract = "This paper considers how two parties communicate securely over an adversary-controlled network. We especially focus on the problem of ID protection because of the recently rapid development of mobile network where any transferred message is easily eavesdropped on. We analyze several existing key exchange protocols and point out their problems: e.g. incompleteness of ID protection and vulnerability to DoS attacks. Then we model the notion of ID protection and construct a protocol with provable security.",
author = "Kenji Imamoto and Kouichi Sakurai",
year = "2006",
month = "12",
day = "1",
doi = "10.1109/SECPERU.2006.9",
language = "English",
isbn = "0769525490",
series = "Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006",
pages = "63--68",
booktitle = "Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006",

}

TY - GEN

T1 - Enhanced privacy in key-exchange protocols by one-time ID

AU - Imamoto, Kenji

AU - Sakurai, Kouichi

PY - 2006/12/1

Y1 - 2006/12/1

N2 - This paper considers how two parties communicate securely over an adversary-controlled network. We especially focus on the problem of ID protection because of the recently rapid development of mobile network where any transferred message is easily eavesdropped on. We analyze several existing key exchange protocols and point out their problems: e.g. incompleteness of ID protection and vulnerability to DoS attacks. Then we model the notion of ID protection and construct a protocol with provable security.

AB - This paper considers how two parties communicate securely over an adversary-controlled network. We especially focus on the problem of ID protection because of the recently rapid development of mobile network where any transferred message is easily eavesdropped on. We analyze several existing key exchange protocols and point out their problems: e.g. incompleteness of ID protection and vulnerability to DoS attacks. Then we model the notion of ID protection and construct a protocol with provable security.

UR - http://www.scopus.com/inward/record.url?scp=33845920721&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33845920721&partnerID=8YFLogxK

U2 - 10.1109/SECPERU.2006.9

DO - 10.1109/SECPERU.2006.9

M3 - Conference contribution

SN - 0769525490

SN - 9780769525495

T3 - Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006

SP - 63

EP - 68

BT - Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006

ER -