Abstract
Recently, the development of mobile communication technology, the mobile terminal users are increasing. In the mobile environment, the security service is very important to provide secure mobile communication, such as mobile electronic-commerce. The security of information is significant to provide secure electronic commerce in mobile communications. Therefore, the security services must be provided in a mobile communication environment. However, the mobile communication environment has some disadvantages, because it has low capacity of power, low performance of CPU and limited memory, etc. In this paper, we propose an efficient key distribution protocol for mobile communications.
This work was supported by the University IT Research Center Project by the MIC(Ministry of Information and Communication) Republic of Korea.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Beller, M.J., Chang, L.F., Yacobi, Y.: Security for Personal Communication Service: Publickey vs. Private key approaches. In: Proceedings of Third IEEE International Symposium on Personal, Indoor and Mobile Radio Communications–PIMRC 1992, pp. 26–31 (1992)
Beller, M.J., Chang, L.F., Yacobi, Y.: Privacy and authentication on a portable communications system. IEEE Journal on Selected Areas in Communications 11(6), 821–829 (1993)
Beller, M.J., Yacobi, Y.: Fully-fledged two-way public key authentication and key agreement for low-cost terminals. IEE Electronics Letters 29(11), 999–1001 (1993)
Carlsen, U.: Optimal Privacy and Authentication on a Portable Communications System. ACM Operating Systems Review 28(3), 16–23 (1994)
Go, J.S., Kim, K.J.: Wireless authentication Protocols Preserving User Anonymity. In: Proceedings of SCIS 2001, vol. 2(1), pp. 159–164 (2001)
Horn, G., Martin, K.M., Mitchell, C.J.: Authentication protocols for mobile network environment value-added services. IEEE Transactions on Vehicular Technology 51, 383–392 (2002)
Lee, K.H., Moon, S.J.: AKA Protocols for Mobile Communications. In: Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. LNCS, vol. 1841, pp. 400–411. Springer, Heidelberg (2000)
Nyberg, K., Rueppel, R.A.: Message recovery for signature schemes based on the discrete logarithm problem. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 182–193. Springer, Heidelberg (1995)
Oh, S.H., Kwak, J., Lee, S.W., Won, D.H.: Security Analysis and Applications of Standard key Agreement Protocols. In: Kumar, V., Gavrilova, M.L., Tan, C.J.K., L’Ecuyer, P. (eds.) ICCSA 2003. LNCS, vol. 2668, pp. 191–200. Springer, Heidelberg (2003)
PACS. PACS(Personal Access Communications System) Air Interface Standard. J-STD-014 (1995)
Varadharajan, V., Mu, Y.: On theDesign of Security Protocols forMobileCommunications. In: Pieprzyk, J.P., Seberry, J. (eds.) ACISP 1996. LNCS, vol. 1172, pp. 134–145. Springer, Heidelberg (1996)
Zheng, Y.: An Authentication and Security Protocol for Mobile Computing. In: Proceedings of IFIP, pp. 249–257 (1996)
Zheng, Y.: Digital Signcryption or How to Achive Cost(Signature and Encryption) < < Cost(Signature) + Cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kwak, J., Oh, S., Won, D. (2006). Efficient Key Distribution Protocol for Electronic Commerce in Mobile Communications. In: Dongarra, J., Madsen, K., Waśniewski, J. (eds) Applied Parallel Computing. State of the Art in Scientific Computing. PARA 2004. Lecture Notes in Computer Science, vol 3732. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11558958_122
Download citation
DOI: https://doi.org/10.1007/11558958_122
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29067-4
Online ISBN: 978-3-540-33498-9
eBook Packages: Computer ScienceComputer Science (R0)