Abstract
By using wireless communications, conferees can join a teleconference at any time and any place. In order to hold a secure teleconference, they must share a conference key before holding the conference. Up to date, public key cryptosystems are used in all proposed conference key distribution schemes for protecting the privacy of conferees’ locations during the conference. The computation cost and communication cost of these schemes is still high. In this paper, we propose a simple and efficient conference scheme for mobile communications. The main merits of our scheme include: (1) conferees can share a common conference key to hold a secure teleconference over a public channel; (2) the location of a particular conferee is protected to prevent a tracking attack; (3) it allows a user to join or quit a mobile teleconference dynamically; (4) only secure one-way hash functions and symmetric key cryptosystems are used, and the computation and communication cost is very low; (5) there needs no passwords or shared keys table in the network center.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Data encryption standard, in National Bureau of Standards. U.S. Dept. of Commerce, Washington, DC (1977)
Feng, B.: Analysis of a conference scheme under active and passive attacks. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 157–163. Springer, Heidelberg (2004)
Frankel, Y., Herzberg, A., Karger, P., Krawczyk, H., Kunzinger, C., Yung, M.: Security issues in a CDPD wireless network. IEEE Personal Communi. 2, 16–27 (1995)
Ingemarsson, I., Tang, D., Wong, C.: A conference key distribution system. IEEE Trans. on Inform. Theory IT-28, 714–720 (1982)
Hirose, S., Ikeda, K.: A conference key distribution system for the star configuration based on the discrete logarithm problem. Inform. Processing Lett. 62, 189–192 (1997)
Horn, G., Martin, K., Mitchell, C.: Authentication protocols for mobile network environment value-added services. IEEE Trans. on Vehicular Technology 51(2), 383–392 (2002)
Hwang, K., Chang, C.: A self-encryption mechanism for authentication of roaming and teleconference service. IEEE Trans. on Wireless Communications 2(2), 400–407 (2003)
Hwang, M., Yang, W.: Conference key distribution schemes for secure digital mobile communications. IEEE J. Select Areas Communi. 13, 416–420 (1995)
Hwang, M.: Dynamic participation in a secure conference scheme for mobile communications. IEEE Trans. on Vehicular Technology 48(5), 1469–1474 (1999)
Hwang, T., Ku, W.: Repairable key distribution protocols for internet environments. IEEE Trans. on Communications 43(5), 1947–1950 (1995)
Koyama, K., Ohta, K.: Identity Based Conference Key Distribution Systems. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 175–184. Springer, Heidelberg (1988)
Ku, W., Chen, S.: Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Trans. on Consumer Electronics 50(1), 204–207 (2004)
Lenstra, A., Tromer, E., Shamir, A., Kortsmit, W., Dodson, B., Hughes, J., Leyland, P.: Factoring estimates for a 1024-bit RSA modulus. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 55–74. Springer, Heidelberg (2003)
Merkle, R.: One way hash functions and DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 428–446. Springer, Heidelberg (1990)
NIST FIPS PUB 180-2, Secure Hash Standard, National Institute of Standards and Technology, U.S. Department of Commerce (2004)
NIST FIPS PUB 197, Announcing the Advanced Encryption Standard(AES), National Institute of Standards and Technology, U.S. Department of Commerce (2001)
Rabin, M.: Digitalized signatures and public key functions as intractable as factorization. MIT Lab. Computer Sci., TR 212 (January 1979)
Rivest, R.L.: The MD5 message-digest algorithm. RFC 1321, Internet Activities Board, Internet Privacy Task Force (1992)
Williams, H.: A Modification of RSA public-key encryption. IEEE Trans. on Inform. Theory IT-26(6), 726–729 (1980)
Yi, X., Siew, C., Tan, C.: A secure and efficient conference scheme for mobile communications. IEEE Trans. on Vehicular Technology 52(4), 784–793 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Juang, WS. (2006). A Simple and Efficient Conference Scheme for Mobile Communications. In: Song, JS., Kwon, T., Yung, M. (eds) Information Security Applications. WISA 2005. Lecture Notes in Computer Science, vol 3786. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11604938_7
Download citation
DOI: https://doi.org/10.1007/11604938_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-31012-9
Online ISBN: 978-3-540-33153-7
eBook Packages: Computer ScienceComputer Science (R0)