Skip to main content

A Simple and Efficient Conference Scheme for Mobile Communications

  • Conference paper
Book cover Information Security Applications (WISA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3786))

Included in the following conference series:

Abstract

By using wireless communications, conferees can join a teleconference at any time and any place. In order to hold a secure teleconference, they must share a conference key before holding the conference. Up to date, public key cryptosystems are used in all proposed conference key distribution schemes for protecting the privacy of conferees’ locations during the conference. The computation cost and communication cost of these schemes is still high. In this paper, we propose a simple and efficient conference scheme for mobile communications. The main merits of our scheme include: (1) conferees can share a common conference key to hold a secure teleconference over a public channel; (2) the location of a particular conferee is protected to prevent a tracking attack; (3) it allows a user to join or quit a mobile teleconference dynamically; (4) only secure one-way hash functions and symmetric key cryptosystems are used, and the computation and communication cost is very low; (5) there needs no passwords or shared keys table in the network center.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Data encryption standard, in National Bureau of Standards. U.S. Dept. of Commerce, Washington, DC (1977)

    Google Scholar 

  2. Feng, B.: Analysis of a conference scheme under active and passive attacks. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 157–163. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  3. Frankel, Y., Herzberg, A., Karger, P., Krawczyk, H., Kunzinger, C., Yung, M.: Security issues in a CDPD wireless network. IEEE Personal Communi. 2, 16–27 (1995)

    Article  Google Scholar 

  4. Ingemarsson, I., Tang, D., Wong, C.: A conference key distribution system. IEEE Trans. on Inform. Theory IT-28, 714–720 (1982)

    Article  MathSciNet  Google Scholar 

  5. Hirose, S., Ikeda, K.: A conference key distribution system for the star configuration based on the discrete logarithm problem. Inform. Processing Lett. 62, 189–192 (1997)

    Article  Google Scholar 

  6. Horn, G., Martin, K., Mitchell, C.: Authentication protocols for mobile network environment value-added services. IEEE Trans. on Vehicular Technology 51(2), 383–392 (2002)

    Article  Google Scholar 

  7. Hwang, K., Chang, C.: A self-encryption mechanism for authentication of roaming and teleconference service. IEEE Trans. on Wireless Communications 2(2), 400–407 (2003)

    Article  MathSciNet  Google Scholar 

  8. Hwang, M., Yang, W.: Conference key distribution schemes for secure digital mobile communications. IEEE J. Select Areas Communi. 13, 416–420 (1995)

    Article  Google Scholar 

  9. Hwang, M.: Dynamic participation in a secure conference scheme for mobile communications. IEEE Trans. on Vehicular Technology 48(5), 1469–1474 (1999)

    Article  Google Scholar 

  10. Hwang, T., Ku, W.: Repairable key distribution protocols for internet environments. IEEE Trans. on Communications 43(5), 1947–1950 (1995)

    Article  Google Scholar 

  11. Koyama, K., Ohta, K.: Identity Based Conference Key Distribution Systems. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 175–184. Springer, Heidelberg (1988)

    Google Scholar 

  12. Ku, W., Chen, S.: Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Trans. on Consumer Electronics 50(1), 204–207 (2004)

    Article  Google Scholar 

  13. Lenstra, A., Tromer, E., Shamir, A., Kortsmit, W., Dodson, B., Hughes, J., Leyland, P.: Factoring estimates for a 1024-bit RSA modulus. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 55–74. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  14. Merkle, R.: One way hash functions and DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 428–446. Springer, Heidelberg (1990)

    Google Scholar 

  15. NIST FIPS PUB 180-2, Secure Hash Standard, National Institute of Standards and Technology, U.S. Department of Commerce (2004)

    Google Scholar 

  16. NIST FIPS PUB 197, Announcing the Advanced Encryption Standard(AES), National Institute of Standards and Technology, U.S. Department of Commerce (2001)

    Google Scholar 

  17. Rabin, M.: Digitalized signatures and public key functions as intractable as factorization. MIT Lab. Computer Sci., TR 212 (January 1979)

    Google Scholar 

  18. Rivest, R.L.: The MD5 message-digest algorithm. RFC 1321, Internet Activities Board, Internet Privacy Task Force (1992)

    Google Scholar 

  19. Williams, H.: A Modification of RSA public-key encryption. IEEE Trans. on Inform. Theory IT-26(6), 726–729 (1980)

    Article  Google Scholar 

  20. Yi, X., Siew, C., Tan, C.: A secure and efficient conference scheme for mobile communications. IEEE Trans. on Vehicular Technology 52(4), 784–793 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Juang, WS. (2006). A Simple and Efficient Conference Scheme for Mobile Communications. In: Song, JS., Kwon, T., Yung, M. (eds) Information Security Applications. WISA 2005. Lecture Notes in Computer Science, vol 3786. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11604938_7

Download citation

  • DOI: https://doi.org/10.1007/11604938_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-31012-9

  • Online ISBN: 978-3-540-33153-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics