scispace - formally typeset
Journal ArticleDOI

Conference key distribution schemes for secure digital mobile communications

Reads0
Chats0
TLDR
Two new conference key distribution schemes for digital mobile communication systems are presented, in which a group of users can generate a common secret keg over a public channel so that they may hold a secure conference.
Abstract
We propose a new service for digital mobile communication systems. The service enables two or more users to hold a secure conference. Two requirements must be considered: privacy and authentication. Privacy involves ensuring that an eavesdropper cannot intercept the conversations of the parties holding the conference. Authentication involves ensuring that service is not obtained fraudulently in order to avoid usage charges. We present two new conference key distribution schemes for digital mobile communication systems. In these schemes, a group of users can generate a common secret keg over a public channel so that they may hold a secure conference. >

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments

TL;DR: The scheme proposed in this paper can enhance the security of Zhu and Ma's scheme and is also simple and efficient.
Book ChapterDOI

A Quick Group Key Distribution Scheme with Entity Revocation

TL;DR: A novel key distribution scheme with “entity revocation” that makes frequent key distribution a practical reality and uses a technique similar to “threshold cryptosystems” and the one-pass Diffie-Hellman key exchange scheme.
Journal ArticleDOI

A self-encryption mechanism for authentication of roaming and teleconference services

TL;DR: The idea behind the proposed technique is to introduce a simple mechanism which is called "self-encryption" and it is suggested that this mechanism can be easily adopted as the authentication function for the secure teleconference service.
Journal ArticleDOI

Enhanced privacy and authentication for the global system for mobile communications

TL;DR: This study proposes three improved methods to enhance the security, to reduce the storage space, to eliminate the sensitive information stored in VLR, and consequently to improve the performance of the GSM system.
Journal ArticleDOI

Extension of authentication protocol for GSM

TL;DR: The merit of the proposed protocol is that it does not cause problems and alter the existing architecture of GSM at all, and the robustness of the new protocol is also based on security algorithms A3, A5 and A8.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Book

Cryptography and data security

TL;DR: The goal of this book is to introduce the mathematical principles of data security and to show how these principles apply to operating systems, database systems, and computer networks.

Digitalized signatures and public-key functions as intractable as factorization

TL;DR: It is proved that for any given n, if the authors can invert the function y = E (x1) for even a small percentage of the values y then they can factor n, which seems to be the first proved result of this kind.