Provably-Secure Enhancement on 3GPP Authentication and Key Agreement Protocol

نویسنده

  • Muxiang Zhang
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

Key Management Protocol for Roaming in Wireless Interworking System

3GPP makes efforts to enable usage of 3GPP system functionalities such as SIP calls between mobile terminals and 3GPP systems via the WLAN and to utilize 3GPP system functionalities to complement the functionalities such as charging means, authentication, authorization, and accounting functions available in the WLAN. And an interworking framework to integrate the services of 3G, WLAN and WiBro ...

متن کامل

Security Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network

The third generation partnership project (3GPP) has addressed the feasibility of interworking and specified the interworking architecture and security architecture for third generation (3G)-wireless local area network (WLAN), it is developing, system architecture evolution (SAE)/ long term evolution (LTE) architecture, for the next generation mobile communication system. To provide a secure 3G-...

متن کامل

Efficient Data Memory Usages of 3GPP Authentication and Key Agreement Protocol

There are various services using mobile devices due to development of communication technology and mobile equipment, regardless of time and place. To secure usage of convenience and smart services, authentication between users’ devices and network is necessary. To achieve this, many researches have been studied about 3 rd Generation Partnership Project Authentication and Key Agreement (3GPP-AKA...

متن کامل

Tripartite Key Exchange in the Canetti-Krawczyk Proof Model

A definition of secure multi-party key exchange in the Canetti-Krawczyk proof model is proposed, followed by a proof of the security of the Joux tripartite key agreement protocol according to that definition. The Joux protocol is then combined with two authentication mechanisms to produce a variety of provably secure key agreement protocols. The properties and efficiency of the Joux based proto...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2003  شماره 

صفحات  -

تاریخ انتشار 2003