Optimal privacy and authentication on a portable communications system

  • Authors:
  • Ulf Carlsen

  • Affiliations:
  • Ecole Nationale Supérieure des Télécommunications de Bretagne, BP 78, 35512 Cesson Sévigné, France

  • Venue:
  • ACM SIGOPS Operating Systems Review
  • Year:
  • 1994

Quantified Score

Hi-index 0.00

Visualization

Abstract

Beller, Chang and Yacobi [2] have recently proposed a set of secret key and public key protocols to meet authentication and privacy requirements for conversation set-up protocols for the initiating party of portable communication systems. This paper improves upon the protocols to obtain a higher assurance of authentication and key distribution. Conversation set-up protocols for the responding party are discussed, a public key protocol providing end-to-end authentication and privacy is described, and relative as well as collective merits of the protocols are emphasised.