2006
DOI: 10.1504/ijsn.2006.011779
|View full text |Cite
|
Sign up to set email alerts
|

A self-encryption authentication protocol for teleconference services

Abstract: A novel authentication protocol for teleconference service is proposed. The main features of the proposed protocol include identity anonymity, one-time Pseudonym Identity (PID) renewal and location intracability. Identity anonymity is achieved by concealing the real identity of a mobile conferee in a prearranged PID. One-time PID Renewal mechanism, in which the mobile conferee's PID is frequently updated communicating with the network centre, is introduced to offer location intracability. It is shown that the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
17
0

Year Published

2008
2008
2013
2013

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(17 citation statements)
references
References 9 publications
0
17
0
Order By: Relevance
“…In the literature, a number of protocols have been proposed for conference key establishment [1], [2], [3], [5], [6]. The first conference key agreement protocol was proposed by Ingemasson et al [1] which is a generalization of two party Diffie-Hellman protocol.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In the literature, a number of protocols have been proposed for conference key establishment [1], [2], [3], [5], [6]. The first conference key agreement protocol was proposed by Ingemasson et al [1] which is a generalization of two party Diffie-Hellman protocol.…”
Section: Introductionmentioning
confidence: 99%
“…The first conference key agreement protocol was proposed by Ingemasson et al [1] which is a generalization of two party Diffie-Hellman protocol. The first conference key establishment scheme for mobile communication was proposed by Hwang and Yang in [2]. Hwang later published an improved solution in [3] to allow dynamic joining and leaving from the conference.…”
Section: Introductionmentioning
confidence: 99%
“…In a large number of BE applications ranging from DVD encryption [1]- [3] to multicast access control [4]- [9] and teleconference [10] [11], the application data are protected by a symmetric cipher with the (short-term) group key; only legitimate users hold confidential information to first derive the common secret and then decrypt the data:…”
Section: Introductionmentioning
confidence: 99%
“…As a result, these schemes offer a convenience that upon receiving the rekey message, instead of employing a standard decryption (e.g., on a ciphertext extracted from (1), (2), or alike), a member only needs to perform a simple modular operation to derive the secret. Such a remainder approach has been generally adopted in recent works including [7]- [11].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation