A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Key Distribution Systems Based on Identification Information
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Toward Hierarchical Identity-Based Encryption
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Signaling System No. 7 (SS7/C7): Protocol, Architecture, and Applications
Signaling System No. 7 (SS7/C7): Protocol, Architecture, and Applications
A man-in-the-middle attack on UMTS
Proceedings of the 3rd ACM workshop on Wireless security
Mutual Authentication and Key Agreement for GSM
ICMB '06 Proceedings of the International Conference on Mobile Business
An Identity-Based Key Agreement Protocol for the Network Layer
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
An improved SCARE cryptanalysis against a secret A3/A8 GSM algorithm
ICISS'07 Proceedings of the 3rd international conference on Information systems security
A new two-party identity-based authenticated key agreement
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Hierarchical identity based encryption with constant size ciphertext
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Porscha: policy oriented secure content handling in Android
Proceedings of the 26th Annual Computer Security Applications Conference
Hi-index | 0.00 |
In this paper, an identity-based key agreement system and its implementation for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to piggyback much of the security overhead for key management to the existing GSM or UMTS infrastructure. The proposed approach offers solutions to the problems of multi-domain key generation, key distribution, multi-domain public parameter distribution and inter-domain key agreement. The feasibility of the approach is illustrated by presenting experimental results based on a Symbian implementation running on N95-1 and N82-1 Nokia smartphones.