Skip to main content

Efficient Key Distribution Protocol for Electronic Commerce in Mobile Communications

  • Conference paper
Applied Parallel Computing. State of the Art in Scientific Computing (PARA 2004)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3732))

Included in the following conference series:

  • 1381 Accesses

Abstract

Recently, the development of mobile communication technology, the mobile terminal users are increasing. In the mobile environment, the security service is very important to provide secure mobile communication, such as mobile electronic-commerce. The security of information is significant to provide secure electronic commerce in mobile communications. Therefore, the security services must be provided in a mobile communication environment. However, the mobile communication environment has some disadvantages, because it has low capacity of power, low performance of CPU and limited memory, etc. In this paper, we propose an efficient key distribution protocol for mobile communications.

This work was supported by the University IT Research Center Project by the MIC(Ministry of Information and Communication) Republic of Korea.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Beller, M.J., Chang, L.F., Yacobi, Y.: Security for Personal Communication Service: Publickey vs. Private key approaches. In: Proceedings of Third IEEE International Symposium on Personal, Indoor and Mobile Radio Communications–PIMRC 1992, pp. 26–31 (1992)

    Google Scholar 

  2. Beller, M.J., Chang, L.F., Yacobi, Y.: Privacy and authentication on a portable communications system. IEEE Journal on Selected Areas in Communications 11(6), 821–829 (1993)

    Article  Google Scholar 

  3. Beller, M.J., Yacobi, Y.: Fully-fledged two-way public key authentication and key agreement for low-cost terminals. IEE Electronics Letters 29(11), 999–1001 (1993)

    Article  Google Scholar 

  4. Carlsen, U.: Optimal Privacy and Authentication on a Portable Communications System. ACM Operating Systems Review 28(3), 16–23 (1994)

    Article  Google Scholar 

  5. Go, J.S., Kim, K.J.: Wireless authentication Protocols Preserving User Anonymity. In: Proceedings of SCIS 2001, vol. 2(1), pp. 159–164 (2001)

    Google Scholar 

  6. Horn, G., Martin, K.M., Mitchell, C.J.: Authentication protocols for mobile network environment value-added services. IEEE Transactions on Vehicular Technology 51, 383–392 (2002)

    Article  Google Scholar 

  7. Lee, K.H., Moon, S.J.: AKA Protocols for Mobile Communications. In: Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. LNCS, vol. 1841, pp. 400–411. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  8. Nyberg, K., Rueppel, R.A.: Message recovery for signature schemes based on the discrete logarithm problem. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 182–193. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  9. Oh, S.H., Kwak, J., Lee, S.W., Won, D.H.: Security Analysis and Applications of Standard key Agreement Protocols. In: Kumar, V., Gavrilova, M.L., Tan, C.J.K., L’Ecuyer, P. (eds.) ICCSA 2003. LNCS, vol. 2668, pp. 191–200. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  10. PACS. PACS(Personal Access Communications System) Air Interface Standard. J-STD-014 (1995)

    Google Scholar 

  11. Varadharajan, V., Mu, Y.: On theDesign of Security Protocols forMobileCommunications. In: Pieprzyk, J.P., Seberry, J. (eds.) ACISP 1996. LNCS, vol. 1172, pp. 134–145. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  12. Zheng, Y.: An Authentication and Security Protocol for Mobile Computing. In: Proceedings of IFIP, pp. 249–257 (1996)

    Google Scholar 

  13. Zheng, Y.: Digital Signcryption or How to Achive Cost(Signature and Encryption) < < Cost(Signature) + Cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kwak, J., Oh, S., Won, D. (2006). Efficient Key Distribution Protocol for Electronic Commerce in Mobile Communications. In: Dongarra, J., Madsen, K., Waśniewski, J. (eds) Applied Parallel Computing. State of the Art in Scientific Computing. PARA 2004. Lecture Notes in Computer Science, vol 3732. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11558958_122

Download citation

  • DOI: https://doi.org/10.1007/11558958_122

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29067-4

  • Online ISBN: 978-3-540-33498-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics