Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Security in computing
Computer networks
An identity-based key-exchange protocol
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Key distribution protocol for digital mobile communication systems
CRYPTO '89 Proceedings on Advances in cryptology
Scheme for secure digital mobile communications based on symmetric key cryptography
Information Processing Letters
Efficient anonymous channel and all/nothing election scheme
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Information Processing Letters
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Cryptography and data security
Cryptography and data security
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Certification of Public Keys within an Identity Based System
ISC '02 Proceedings of the 5th International Conference on Information Security
A secure and optimally efficient multi-authority election scheme
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Receipt-free mix-type voting scheme: a practical solution to the implementation of a voting booth
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Conference key distribution schemes for secure digital mobile communications
IEEE Journal on Selected Areas in Communications
Two-tier authentication for cluster and individual sets in mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Packet construction for secure conference call request in ad hoc network systems
Information Sciences: an International Journal
Efficient, anonymous, and authenticated conference key setup in cellular wireless networks
Computers and Electrical Engineering
Vehicular telematics over heterogeneous wireless networks: A survey
Computer Communications
Hi-index | 14.98 |
In this paper, a secure and anonymous conference call set-up scheme is proposed for a portable cellular mobile system. The proposed scheme uses an identity-based concept and enables a mobile unit and a base station to directly authenticate each other by their public identity. It provides mobile subscribers with user identification privacy. Each mobile unit joining in this system can determine whether it is part of a conference call, but it cannot derive any further information about who else is also in the conference. That is to say, an anonymous property, accomplished through the aspect of the knapsack-like cipher mechanism, is achieved among the communicating mobiles. Furthermore, reauthentication in the course of hand-off is also discussed and the reauthentication procedure is performed through a privacy homomorphism mechanism. The time computation with an 8-bit microcontroller handset is acceptable for performing an anonymous conference call in such mobile systems. Therefore, our scheme is feasible and able to be implemented in the existing wireless exploration environment.