Browse > Article

Group Key Agreement for Mobile Devices in Different Cells  

Kim Jeeyeon (성균관대학교 전기전자및컴퓨터공학과)
Choi Yeonyi (신성대학 컴퓨터정보계열)
Kim Seungjoo (성균관대학교 정보통신공학부 정보보호연구소)
Won Dongho (성균관대학교 정보통신공학부 정보보호연구소)
Abstract
Mobile communication has become more pervasive and it is considered as one of main concerns oi conferencing, multi-user games and etc. in mobile environment. These applications need to secure communication in group. Most of the published protocols are based on model which consists of a stationary base station and a cluster of mobile devices. In this paper, we have focused on the extended model of which participants are several base stations and mobile devices in different cells. We present a new group key protocol among mobile devices in different cells and analyze its security And we also look at how password authentication can be used to our group key agreement protocol. The mobile device's computing load may be reduced by using password authentication.
Keywords
Group key agreement; Mobile devices;
Citations & Related Records
연도 인용수 순위
  • Reference
1 E. Bresson, O. Chevassut, D. Pointcheval, 'Group Diffie-Hellman Key Exchange Secure Against Dictionary Attacks,' Advances in Cryptology Asiacrypt'02, LNCS vol. 2501, Springer-Verlag. pp. 497-514, 2002
2 S. Keung, K. Siu, 'Efficient Protocols Secure Against Guessing and Replay Attacks,' Proceedings of the Fourth International Conference on Computer Communications and Networks, pp. 105-112, 1995   DOI
3 J. W. Byun, I. R. Jeong, D. H. Lee, C. S. Park, 'Password-Authenticated Key Exchange between Clients with Different Passwords,' 4th International Conference on Information and Communication Security(ICICS), pp. 134-146, 2002   DOI
4 J. Kim, S. Kim, J. Kwak, D. Won, 'Cryptanalysis and improvement of password authenticated key exchange scheme between clients with different passwords,' 2nd Computational Science and Its Applications(ICCSA), pp. 895-902, May 2004
5 N. Asokan, P. Ginzboorg, 'Key Agreement in Ad-hoc Networks,' Expanded version of a talk given at the Nordsec'99 workshop, Februry 2000
6 J. Katz, R. Ostrovsky, M. Yung, 'Efficient Password-Authenticated key exchange Using human-Memorable Passwords,' In Advances in Cryptology-Eurocrypt 2001, Springer-Verlag, pp. 475-494, 2001
7 M. Steiner, G. Tsudik, M. Waidner, 'Refinement and extension of Encrypted Key Exchange,' ACM Operating Systems Review, vol. 29, no. 3, pp. 22-30, 1995   DOI
8 C. Carroll, Y. Frankel, Y. Tsiounis, 'Efficient key distribution for slow computing devices Achieving fast over-the-air activation for wireless systems,' In IEEE Symposium on Security and Privacy (S&P '98), May 1998   DOI
9 M. Bellare, D. Pointcheval, P. Rogaway, 'Authenticated key exchange secure against dictionary attacks,' In Advances in Cryptology Eurocrypt 2000, Springer-Verlag, pp. 139-155, 2000
10 S. Bellovin, M. Merrit, 'Encrypted key exchange: password based protocols secure against dictionary attacks,' In Proc. of the Symposium on Security and Privacy, pp. 72-84, 1992   DOI
11 E. Bresson, O. Chevassut, A. Essiari, D. Pointcheval, 'Mutual Authentication and Group Key Agreement for Low-Power Mobile Devices,' International Conference on Mobile and Wireless Communications Networks, Springer-Verlag,, Lecture Notes in Computer Science, LNCS 1514, pp. 59-62, 2003
12 M. Steiner, G. Tsudik, M. Waidner, 'Diffie-Hellman Key Distribution Extended to Group Communication,' Proc. of the 3rd A CM Conference on Computer and Communication Security(CCS'96), pp. 31-37, March 1996   DOI
13 J. Nam, S. Kim, D. Won, 'A Weakness in the Bresson-Chevassut-Essiari-Pointcheval' s Group Key Agreement Scheme for Low-Power Mobile Devices,' In Cryptology ePrint Archive, Report 2004/251, to appear, IEEE Communications Letters, 2005
14 J. Nam, J. Lee, S. Kim, D. Won, 'DDH-based Group Key Agreement in a Mobile Environment,' In Cryptology ePrint Archive, Report 2004/127, to appear, Journal of Systems and Software(JSS), 2005
15 I. Ingemarsson, D. T. Tang, C.K. Wong, 'A conference key distribution system,' IEEE Transactions on Information Theory, IT-28(5), pp. 714-720, September 1982
16 M. Burmester, Y. Desmedt, 'A secure and efficient conference key distribution system,' In Advances in Cryptology-Eurocrypt'94, Springer-Verlag, pp. 275-286, 1995