A secure verifiable key agreement protocol for mobile conferencing

被引:0
|
作者
Saha, Mounita [1 ]
RoyChowdhury, Dipanwita [1 ]
Sengupta, Indranil [1 ]
机构
[1] Indian Inst Technol, Dept CSE, Kharagpur, W Bengal, India
关键词
key agreement protocols; authentication; mobile teleconference;
D O I
10.1109/COMSWA.2008.4554412
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A growing application area in wireless communications is mobile teleconference. However, wireless communication are more susceptible to eavesdropping and unauthorized access than the wired communication. It is therefore crucial to build secure conference scheme for such communication. In this work, propose a true conference key agreement scheme which addresses some security issues not considered in previous works on conference key schemes. In the proposed protocol, the users can verify the utilization of their share in key construction. Also, the scheme is forward secure, provides mutual authentication and secure dynamic joining and leaving. The protocol is shown to be resistant against replay and impersonation attacks.
引用
收藏
页码:219 / 222
页数:4
相关论文
共 50 条
  • [41] SAKA: a secure authentication and key agreement protocol for GSM networks
    Neetesh Saxena
    Narendra S. Chaudhari
    CSI Transactions on ICT, 2013, 1 (4) : 331 - 341
  • [42] Enhancing the Oakley key agreement protocol with secure time information
    Szalachowski, Pawel
    Kotulski, Zbigniew
    2012 INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (SPECTS), 2012,
  • [43] CONJUGATION AS PUBLIC KEY AGREEMENT PROTOCOL IN MOBILE CRYPTOGRAPHY
    Ottaviani, Vittorio
    Zanoni, Alberto
    Regoli, Massimo
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 411 - 416
  • [44] A verifiable quantum key agreement protocol based on six-qubit cluster states
    Li-Juan Liu
    Zhi-Hui Li
    The European Physical Journal D, 2021, 75
  • [45] Strongly secure ID-based authenticated key agreement protocol for mobile multi-server environments
    Tseng, Yuh-Min
    Huang, Sen-Shan
    You, Meng-Lin
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (11)
  • [46] A verifiable quantum key agreement protocol based on six-qubit cluster states
    Liu, Li-Juan
    Li, Zhi-Hui
    EUROPEAN PHYSICAL JOURNAL D, 2021, 75 (07):
  • [47] An anonymous and secure key agreement protocol for NFC applications using pseudonym
    Mahdi Ghafoorian
    Morteza Nikooghadam
    Wireless Networks, 2020, 26 : 4269 - 4285
  • [48] An anonymous and secure authentication and key agreement scheme for session initiation protocol
    Lin, Hao
    Wen, Fengtong
    Du, Chunxia
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (02) : 2315 - 2329
  • [49] Provably secure authenticated key agreement protocol based on hierarchical identity
    Cao, Chen-Lei
    Liu, Ming-Qi
    Zhang, Ru
    Yang, Yi-Xian
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2014, 36 (12): : 2848 - 2854
  • [50] Strongly secure authenticated key agreement protocol using smart card
    Li, Xiao-Wei
    Zhang, Yu-Qing
    Zhang, Ge-Fei
    Liu, Xue-Feng
    Fan, Dan
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2014, 42 (08): : 1587 - 1593