Abstract
Employing public key-based security architecture is inevitable for the advanced security applications in the mobile networks. However, key storage management problems have arisen, because the public key computation is still the large overhead to USIM, and the mobile equipment has potential threats of the key leakage or loss. In order to solve such shortcomings, we improve the key-insulated models and propose “Trust Delegation” model that the overall security computations are operated in ME, while the initial private key still remains in the secure storage in USIM. Our model is resilient against not only key exposure but also key loss. Finally, we show that the overall transactions can be reduced to one-third than current 3GPP Generic Authentication Architecture.







Similar content being viewed by others
References
Abe T, Okamoto M (2002) Delegation chains secure up to constant length. IEICE Trans. Fundamentals E85-A(1):110–116
Abid M, Song S, Moustafa H, Afifi H (2009) Integrating identity-based cryptography in IMS service authentication. Int J Netw Secur Appl (IJNSA) 1(3)
Boneh D, Franklin MK (2001) Identity-based encryption from the Weil Pairing advances in cryptology. Proceedings of CRYPTO 2001
Dodis Y, Katz J, Xu S, Yung M (2002) Key-insulated public key cryptosystems. In: EUROCRYPT ‘02 proceedings of the international conference on the theory and applications of cryptographic techniques: advances in cryptology
Dodis Y, Katz J, Xu S, Yung M (2003) Strong key-insulated signature schemes. Proceedings of PKC’03
Handschuh H, Paillier P (2000) Smart card crypto-coprocessors for public-key cryptography, CARDIS ‘98. In: Proceedings of the international conference on smart card research and applications, Springer, London, UK, pp 372–379
Koblitz N (1987) Elliptic curve cryptosystems. In: Mathematics of Computation 48, p 203–209
Martin L (2008) Introduction to identity-based encryption. Number ISBN-13: 978-1-59693-238-8. Artech House, Inc., 685 Canton Street, Norwood, MA 02062
Na JC (2008) Next generation USIM technologies. TTA Journal (written in Korean) 116:80–85
Ohtake G, Hanaoka G, Ogawa K (2008) An efficient strong key-insulated signature scheme and its application. 5th European PKI Workshop, NTNU, Trondheim, Norway, June 16–17
RSA Laboratories (2000) RSAES-OAEP Encryption Scheme—Algorithm specification and supporting documentation
Sun Microsystems, Inc. (2009) Runtime Environment Specification, java card platform, version 3.0.1 connected edition
Third Generation Partnership (3GPP) (2011) TS 33.401 v 11.0.1 3GPP System Architecture Evolution (SAE); Security Architecture (Release 11)
Third Generation Partnership (3GPP) (2010) TS 33.220 v10.0.0 Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (Release 10)
Third Generation Partnership (3GPP) (2010) TS 33.102 v10.0.0 3G Security: security architecture (Release 10)
Third Generation Partnership (3GPP) (2010) TS 33.221 v10.0.0 Generic Authentication Architecture (GAA); Support for Subscriber Certificates (Release 10)
Traynor P, Lin M, Ongtang M, Rao V, Jaeger T, McDaniel P, La Porta V (2009) On cellular botnets: measuring the impact of malicious devices on a cellular network core. In CCS’09: Proceedings of the 16th ACM conference on Computer and communications security, p 223–234, New York, NY, USA, ACM
Acknowledgments
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (KRF-2008-331-D00580).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Han, K., Mun, H., Shon, T. et al. Secure and efficient public key management in next generation mobile networks. Pers Ubiquit Comput 16, 677–685 (2012). https://doi.org/10.1007/s00779-011-0434-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-011-0434-9