Abstract
Generally, in mobile communication environments, Wireless Authentication and Key Establishment (WAKE) protocols are essential for secure information transmission. Key Recovery (KR) protocols, including WAKE protocols, can enable an authorized third party to gain access to encrypted message data under certain lawful circumstances. However, it is not easy to construct secure and strongly privacy-preserved KR protocols for mobile communication environments due to mobile hardware resources’ limitation. In this paper, we propose a security-enhanced KR protocol and then we construct a privacy-enhanced KR protocol, which is based on the security-enhanced KR protocol, for protecting users’ location privacy.
Similar content being viewed by others
References
Ojanpera T, Prasad R (1998) IMT-2000 applications. In: Ojanpera T, Prasad R (eds) Wideband CDMA for third generation mobile communication. Artech House, Norwood, pp 65–76
Buhanal K et al (1997) IMT-2000: service providers perspective, IEEE Pers Commun (August) 1997
Black U (1999) Third generation mobile systems (TGMSs). In: Second generation mobile & wireless networks. Prentice Hall, New York
Denning D, Branstad D (1996) A taxonomy for key escrow encryption systems. Commun ACM 39:34–40
Horn G, Preneel B (1998) Authentication and payment in future mobile systems. In: Computer security-ESORICS’98, 1998. LNCS, vol 1485. Springer, Berlin, pp 277–293
ACTS AC095 (1997) ASPeCT deliverable D02, Initial report on security requirements. AC095/ATEA/W21/DS/P/02/B Feb., 1997. Available from http://www.esat.kuleuven.ac.be/cosic/aspect/
Rantos K, Mitchell C (1999) Key Recovery in ASPeCT authentication and initialization of payment protocol. In: Proceedings of ACTS mobile summit, Sorrento, Italy, June 1999
Nieto J, Park D, Boyd C, Dawson E (2000) Key Recovery in third generation wireless communication systems. In: Public key cryptography-PKC 2000. LNCS, vol 1751. Springer, Berlin, pp 223–237
Kim CH, Lee PJ (2001) New Key Recovery in WAKE protocol. In: Public key cryptography-PKC 2001. LNCS, vol 1403. Springer, Berlin, pp 325–338
Askwith B, Merabti M, Shi Q, Whiteley K (1997) Achieving user privacy in mobile networks. In: 13th Annual computer security applications conference
NIST (1994) Escrow Encryption Standard (EES). In: Federal information processing standard publication (FIPS PUB), p 185
ETSI TC Security (1997) Specification for trusted third party service: part 1 key management and key escrow/recovery. DEN/SEC-003001x, Draft Version 1.0(edition2), 11th November 1997
ETSI TC-STAG (1996) Security techniques advisory group (STAG); definition of user requirements for lawful interception of telecommunications: requirements of the law enforcement agencies. ETR 331, December 1996
Pfitzmann B, Waidner M (1998) How to break fraud-detectable key recovery. Oper Syst Rev 21:23–28
Schnorr CP (1990) Efficient identification and signatures for smart cards. In: CRYPTO’89, 1989. LNCS, vol 330. Springer, Berlin, pp 239–251
Federrath H, Jerichow A, Kesdogan D, Pfitzmann A (1995) Security in public mobile communication networks. In: Proceedings of the IFIP TC6 international workshop on personal wireless communications, 1995, pp 105–116
Kesdogan D. Federrath H, Jericow A, Pfizmann A (1996) Location management strategies increasing privacy in mobile communication systems. In: 12th IFIP international conference on information security (IFIP/SEC’96), 1996
Kesdogan D, Reichl P, Junghartchen K (1998) Distributed temporary pseudonyms: a new approach for protecting location information in mobile communication networks. In: Ojanpera T, Prasad R (eds) ESORICS’98, 1998. LNCS, vol 1485. Springer, Berlin, pp 295–312
Kim SS, Yeo S-S, Park H-J, Kim SK (2005) A new scheme for the location information protection in mobile communication environments. In: MMM-ACNS 2005. LNCS, vol 3685. Springer, Berlin, pp 436–441
Bowen CL, Martin TL (2007) Preserving user location privacy based on web queries and LBS responses. In: Information assurance and security workshop, IAW’07, 2007, pp 175–182
Pfitzmann A, Pfitzmann B, Waidner M (1991) ISDN-MIXes untraceable communication with very small bandwidth overhead. In: 7th IFIP international conference on information security (IFIP/SEC’91), 1991
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Park, J.H. Privacy-enhanced Key Recovery in mobile communication environments. J Supercomput 54, 82–93 (2010). https://doi.org/10.1007/s11227-009-0287-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-009-0287-4