Browse > Article
http://dx.doi.org/10.5573/ieek.2013.50.3.023

Scheme for Verification Between Mobile Devices in a Service with Expiration Time by Using Zero-knowledge Proof  

Park, Young-Hoon (Software Center, Samsung Electronics)
Seo, Seung-Woo (Department of Electrical and Computer Science, Seoul National University)
Publication Information
Journal of the Institute of Electronics and Information Engineers / v.50, no.3, 2013 , pp. 23-32 More about this Journal
Abstract
As the mobile communication technology is developed, the services for communication between the mobile devices are provided, and the amount of usage is increasing tremendously. For the device-to-device communication, the device should be verified if it is a service member. The existing verification schemes include interactions with the third party, while this may cause the problems that the bandwidth is dissipated and the devices which are out of the communication range of the base station cannot communicate with other devices. To solve such problems, we propose a new scheme for verification between mobile devices without interaction of third party. For the proposed scheme, we develop and employ a new zero-knowledge proof protocol, which verifies the device's membership and its expiration time. Furthermore, the scheme guarantees privacy of the mobile device since it checks the encrypted verification message without decrypting, and protects replaying attack since it uses challenge-response method.
Keywords
device-to-device verification; zero-knowledge proof; strong Diffie-Hellman;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 류민우, 차시호, 조국현. 2010. "이동하는 차량 간 통신의 신뢰성 향상을 위한 개선된 탐욕 메시지포워딩 프로토콜.", 전자공학회논문지-TC, 제47권, 제4호, 43-50쪽
2 TR 22.868-800 Study on Facilitating Machine to Machine Communication in 3GPP Systems
3 A. Sebastian, M. Tang, Y. Feng, and M. Looi, "A multicast routing scheme for ecient safety message dissemination in VANET," In Wireless Communications and Networking Conference (WCNC), 2010 IEEE, pages 1-6, Apr 2010.
4 최재덕, 정수환. 2008. "빠른 이동성을 지원하는 VANET 환경의 핸드오버 인증 프로토콜," 전자공학회논문지-TC, 제45권, 제5호, 30-39쪽   과학기술학회마을
5 P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, and J. P. Hubaux, "Secure vehicular communication systems: design and architecture," Comm. Mag., Vol. 46, no. 11, pp. 100-109.
6 권창영, 이인숙, 원동호. 1993. "영지식 대화형 증명 방식 및 응용 프로토콜.", 전자공학회논문지, 제20권, 제2호, 190-203쪽   과학기술학회마을
7 D. Boneh, and M. Franklin, "Identity-based encryption from the weil pairing," SIAM J. Comput., Vol. 32, no. 3, pp. 586-615, Mar 2003.   DOI   ScienceOn
8 X. Lin, X. Sun, P. Ho, and X. Shen. "GSIS: A secure and privacy-preserving protocol for vehicular communications," Vehicular Technology, IEEE Transactions on, Vol. 56, no. 6, pp. 3442-3456, Nov. 2007.   DOI   ScienceOn
9 Y. Kawahara, T. Takagi, and E. Okamoto. "Efficient Implementation of Tate Pairing on a Mobile Phone Using Java," In Computational Intelligence and Security, Lecture Notes In Artificial Intelligence, Vol. 4456, 396-405 Springer-Verlag, Berlin, Heidelberg.
10 S. D. Galbraith, K. Harrison, and D. Soldera. 2002. "Implementing the Tate Pairing," In Proceedings of the 5th International Symposium on Algorithmic Number Theory (ANTS-V), Claus Fieker and David R. Kohel (Eds.), 324-337 Springer-Verlag, London, UK, UK.
11 D. Boneh, X. Boyen, and H. Shacham, "Short group signatures, " In proceedings of CRYPTO 04, pages 41-55, LNCS series, Springer-Verlag, 2004.
12 G. Atenies, D. Song, and G. Tsudik, "Quasiefficient revocation of group signatures," in Proc. Financ. Cryptogr., Southampton, pp. 183-197, Bermuda, Mar. 2002.
13 D. Boneh and H. Shacham, "Group signatures with verifier-local revocation," in Proc. ACM CCS, pp. 166-177, Washington DC, Oct. 2004.