Enhanced privacy in key-exchange protocols by one-time ID

Kenji Imamoto, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper considers how two parties communicate securely over an adversary-controlled network. We especially focus on the problem of ID protection because of the recently rapid development of mobile network where any transferred message is easily eavesdropped on. We analyze several existing key exchange protocols and point out their problems: e.g. incompleteness of ID protection and vulnerability to DoS attacks. Then we model the notion of ID protection and construct a protocol with provable security.

Original languageEnglish
Title of host publicationProceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006
Pages63-68
Number of pages6
DOIs
Publication statusPublished - Dec 1 2006
Event2nd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006 - Lyon, France
Duration: Jun 29 2006Jun 29 2006

Publication series

NameProceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006
Volume2006

Other

Other2nd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006
Country/TerritoryFrance
CityLyon
Period6/29/066/29/06

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Fingerprint

Dive into the research topics of 'Enhanced privacy in key-exchange protocols by one-time ID'. Together they form a unique fingerprint.

Cite this