Key-exchange protocol using pre-agreed session-ID

Kenji Imamoto, Kouichi Sakurai

Research output: Contribution to journalConference article

1 Citation (Scopus)

Abstract

Technical applications for various uses have been proposed in communication technology in recent years. Although especially the Internet and radio communications are used daily it is known that eaves-dropping is easy and the related problem has occurred mostly, especially privacy. In this paper, we introduce Pre-Agreed Session ID (PAS) and formalize a key-exchange protocol using it. PAS is a identification which is a disposable unique value used for every session to protect identity from the attacker. The security notion of identity concealment is formulized in this paper. Moreover, we propose a secure key-exchange protocol using PAS under the cryptographic primitives. Furthermore, we argue about the problems which arise when PAS is introduced.

Original languageEnglish
Pages (from-to)375-387
Number of pages13
JournalLecture Notes in Computer Science
Volume3325
Publication statusPublished - Sep 1 2005
Event5th International Workshop on Information Security Applications, WISA 2004 - Jeju Island, Korea, Republic of
Duration: Aug 23 2004Aug 25 2004

Fingerprint

Key Exchange
Network protocols
Radio communication
Privacy
Internet
Communication

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Key-exchange protocol using pre-agreed session-ID. / Imamoto, Kenji; Sakurai, Kouichi.

In: Lecture Notes in Computer Science, Vol. 3325, 01.09.2005, p. 375-387.

Research output: Contribution to journalConference article

@article{8c08aa1ea06d4b969fc788bfa5fe239f,
title = "Key-exchange protocol using pre-agreed session-ID",
abstract = "Technical applications for various uses have been proposed in communication technology in recent years. Although especially the Internet and radio communications are used daily it is known that eaves-dropping is easy and the related problem has occurred mostly, especially privacy. In this paper, we introduce Pre-Agreed Session ID (PAS) and formalize a key-exchange protocol using it. PAS is a identification which is a disposable unique value used for every session to protect identity from the attacker. The security notion of identity concealment is formulized in this paper. Moreover, we propose a secure key-exchange protocol using PAS under the cryptographic primitives. Furthermore, we argue about the problems which arise when PAS is introduced.",
author = "Kenji Imamoto and Kouichi Sakurai",
year = "2005",
month = "9",
day = "1",
language = "English",
volume = "3325",
pages = "375--387",
journal = "Lecture Notes in Computer Science",
issn = "0302-9743",
publisher = "Springer Verlag",

}

TY - JOUR

T1 - Key-exchange protocol using pre-agreed session-ID

AU - Imamoto, Kenji

AU - Sakurai, Kouichi

PY - 2005/9/1

Y1 - 2005/9/1

N2 - Technical applications for various uses have been proposed in communication technology in recent years. Although especially the Internet and radio communications are used daily it is known that eaves-dropping is easy and the related problem has occurred mostly, especially privacy. In this paper, we introduce Pre-Agreed Session ID (PAS) and formalize a key-exchange protocol using it. PAS is a identification which is a disposable unique value used for every session to protect identity from the attacker. The security notion of identity concealment is formulized in this paper. Moreover, we propose a secure key-exchange protocol using PAS under the cryptographic primitives. Furthermore, we argue about the problems which arise when PAS is introduced.

AB - Technical applications for various uses have been proposed in communication technology in recent years. Although especially the Internet and radio communications are used daily it is known that eaves-dropping is easy and the related problem has occurred mostly, especially privacy. In this paper, we introduce Pre-Agreed Session ID (PAS) and formalize a key-exchange protocol using it. PAS is a identification which is a disposable unique value used for every session to protect identity from the attacker. The security notion of identity concealment is formulized in this paper. Moreover, we propose a secure key-exchange protocol using PAS under the cryptographic primitives. Furthermore, we argue about the problems which arise when PAS is introduced.

UR - http://www.scopus.com/inward/record.url?scp=23944443245&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=23944443245&partnerID=8YFLogxK

M3 - Conference article

VL - 3325

SP - 375

EP - 387

JO - Lecture Notes in Computer Science

JF - Lecture Notes in Computer Science

SN - 0302-9743

ER -