Abstract
A key distribution protocol is proposed for digital mobile communi- cation systems. The protocol can be used with a star-type network. User terminals have a constraint of being hardware-limited.
Security of the protocol is discussed. A countermeasure is proposed to cope with a possible active attack by a conspiracy of two opponents.
Visiting Research Scholar at The George Washington University, 1988–1990
Chapter PDF
References
D. E. Denning, “Cryptography and Data Security”, Addison-Wesley, 1983.
W. Diffie and M. Hellman, “New Directions in Cryptography”, IEEE Trans. on Info. Theory, Vol. IT-22, No. 6, pp. 644–654, 1976.
W. de Jonge and D. Chaum, “Attacks on Some RSA Signatures”, Advances in Cryptology: Proceedings of Crypto’85, Springer-Verlag, pp. 12–27, 1986.
J. H. Moore, “Protocol Failures in Cryptosystems”, Proc. of IEEE, Vol. 76, No. 5, pp. 594–602.
M. O. Rabin, “Digitalized Signatures and Public-Key Functions as Intractable as Factorization”, MIT/LCS/TR-212, MIT Lab for Computer Science, Cambridge, Massachusetts, January 1979.
G. J. Simmons, “An Impersonation-proof Identity Verification Scheme”, Advances in Cryptology: Proceedings of Crypto’87, Springer-Verlag, pp. 211–215, 1988.
G. J. Simmons, private letter, January 1989.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1990 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tatebayashi, M., Matsuzaki, N., Newman, D.B. (1990). Key Distribution Protocol for Digital Mobile Communication Systems. In: Brassard, G. (eds) Advances in Cryptology — CRYPTO’ 89 Proceedings. CRYPTO 1989. Lecture Notes in Computer Science, vol 435. Springer, New York, NY. https://doi.org/10.1007/0-387-34805-0_30
Download citation
DOI: https://doi.org/10.1007/0-387-34805-0_30
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-97317-3
Online ISBN: 978-0-387-34805-6
eBook Packages: Springer Book Archive