Skip to main content

Advertisement

Log in

Privacy-enhanced Key Recovery in mobile communication environments

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Generally, in mobile communication environments, Wireless Authentication and Key Establishment (WAKE) protocols are essential for secure information transmission. Key Recovery (KR) protocols, including WAKE protocols, can enable an authorized third party to gain access to encrypted message data under certain lawful circumstances. However, it is not easy to construct secure and strongly privacy-preserved KR protocols for mobile communication environments due to mobile hardware resources’ limitation. In this paper, we propose a security-enhanced KR protocol and then we construct a privacy-enhanced KR protocol, which is based on the security-enhanced KR protocol, for protecting users’ location privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Ojanpera T, Prasad R (1998) IMT-2000 applications. In: Ojanpera T, Prasad R (eds) Wideband CDMA for third generation mobile communication. Artech House, Norwood, pp 65–76

    Google Scholar 

  2. Buhanal K et al (1997) IMT-2000: service providers perspective, IEEE Pers Commun (August) 1997

  3. Black U (1999) Third generation mobile systems (TGMSs). In: Second generation mobile & wireless networks. Prentice Hall, New York

    Google Scholar 

  4. Denning D, Branstad D (1996) A taxonomy for key escrow encryption systems. Commun ACM 39:34–40

    Article  Google Scholar 

  5. Horn G, Preneel B (1998) Authentication and payment in future mobile systems. In: Computer security-ESORICS’98, 1998. LNCS, vol 1485. Springer, Berlin, pp 277–293

    Chapter  Google Scholar 

  6. ACTS AC095 (1997) ASPeCT deliverable D02, Initial report on security requirements. AC095/ATEA/W21/DS/P/02/B Feb., 1997. Available from http://www.esat.kuleuven.ac.be/cosic/aspect/

  7. Rantos K, Mitchell C (1999) Key Recovery in ASPeCT authentication and initialization of payment protocol. In: Proceedings of ACTS mobile summit, Sorrento, Italy, June 1999

  8. Nieto J, Park D, Boyd C, Dawson E (2000) Key Recovery in third generation wireless communication systems. In: Public key cryptography-PKC 2000. LNCS, vol 1751. Springer, Berlin, pp 223–237

    Google Scholar 

  9. Kim CH, Lee PJ (2001) New Key Recovery in WAKE protocol. In: Public key cryptography-PKC 2001. LNCS, vol 1403. Springer, Berlin, pp 325–338

    Google Scholar 

  10. Askwith B, Merabti M, Shi Q, Whiteley K (1997) Achieving user privacy in mobile networks. In: 13th Annual computer security applications conference

  11. NIST (1994) Escrow Encryption Standard (EES). In: Federal information processing standard publication (FIPS PUB), p 185

  12. ETSI TC Security (1997) Specification for trusted third party service: part 1 key management and key escrow/recovery. DEN/SEC-003001x, Draft Version 1.0(edition2), 11th November 1997

  13. ETSI TC-STAG (1996) Security techniques advisory group (STAG); definition of user requirements for lawful interception of telecommunications: requirements of the law enforcement agencies. ETR 331, December 1996

  14. Pfitzmann B, Waidner M (1998) How to break fraud-detectable key recovery. Oper Syst Rev 21:23–28

    Article  Google Scholar 

  15. Schnorr CP (1990) Efficient identification and signatures for smart cards. In: CRYPTO’89, 1989. LNCS, vol 330. Springer, Berlin, pp 239–251

    Google Scholar 

  16. Federrath H, Jerichow A, Kesdogan D, Pfitzmann A (1995) Security in public mobile communication networks. In: Proceedings of the IFIP TC6 international workshop on personal wireless communications, 1995, pp 105–116

  17. Kesdogan D. Federrath H, Jericow A, Pfizmann A (1996) Location management strategies increasing privacy in mobile communication systems. In: 12th IFIP international conference on information security (IFIP/SEC’96), 1996

  18. Kesdogan D, Reichl P, Junghartchen K (1998) Distributed temporary pseudonyms: a new approach for protecting location information in mobile communication networks. In: Ojanpera T, Prasad R (eds) ESORICS’98, 1998. LNCS, vol 1485. Springer, Berlin, pp 295–312

    Google Scholar 

  19. Kim SS, Yeo S-S, Park H-J, Kim SK (2005) A new scheme for the location information protection in mobile communication environments. In: MMM-ACNS 2005. LNCS, vol 3685. Springer, Berlin, pp 436–441

    Google Scholar 

  20. Bowen CL, Martin TL (2007) Preserving user location privacy based on web queries and LBS responses. In: Information assurance and security workshop, IAW’07, 2007, pp 175–182

  21. Pfitzmann A, Pfitzmann B, Waidner M (1991) ISDN-MIXes untraceable communication with very small bandwidth overhead. In: 7th IFIP international conference on information security (IFIP/SEC’91), 1991

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jong Hyuk Park.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Park, J.H. Privacy-enhanced Key Recovery in mobile communication environments. J Supercomput 54, 82–93 (2010). https://doi.org/10.1007/s11227-009-0287-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-009-0287-4

Keywords