Optimal privacy and authentication on a portable communications system
- 1 July 1994
- journal article
- Published by Association for Computing Machinery (ACM) in ACM SIGOPS Operating Systems Review
- Vol. 28 (3) , 16-23
- https://doi.org/10.1145/182110.182112
Abstract
Beller, Chang and Yacobi [2] have recently proposed a set of secret key and public key protocols to meet authentication and privacy requirements for conversation set-up protocols for the initiating party of portable communication systems. This paper improves upon the protocols to obtain a higher assurance of authentication and key distribution. Conversation set-up protocols for the responding party are discussed, a public key protocol providing end-to-end authentication and privacy is described, and relative as well as collective merits of the protocols are emphasised.Keywords
This publication has 11 references indexed in Scilit:
- Using logics to detect implementation-dependent flaws [cryptographic protocol design]Published by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- On key distribution protocols for repeated authenticationACM SIGOPS Operating Systems Review, 1993
- Privacy and authentication on a portable communications systemIEEE Journal on Selected Areas in Communications, 1993
- Systematic design of a family of attack-resistant authentication protocolsIEEE Journal on Selected Areas in Communications, 1993
- An overview of ASN.1Computer Networks and ISDN Systems, 1992
- A semantics for a logic of authentication (extended abstract)Published by Association for Computing Machinery (ACM) ,1991
- Portable digital radio communications-an approach to tetherless accessIEEE Communications Magazine, 1989
- Timestamps in key distribution protocolsCommunications of the ACM, 1981
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976