DocumentCode :
351157
Title :
An elliptic curve authenticated key exchange based approach to key infrastructure
Author :
Koduri, Praveen ; Mahajan, Anant ; Montague, Paul ; Moseley, Philip
Author_Institution :
KES, Univ. of South Australia, The Levels, SA, Australia
fYear :
1999
fDate :
36495
Firstpage :
513
Lastpage :
517
Abstract :
Introduces an elliptic curve analogue to the existing exponential/encrypted key exchange methods, with a view to optimizing such techniques for implementation within a mobile (wireless) framework. The complete scheme of how these methods can be adopted, along with the other security components (e.g. proxies) in the existing infrastructure is analysed. In this paper, we discuss the complete key setup procedures and various scenarios describing how confidential communication is performed once the key has been set up and mutual authentication achieved. The advantages of the proposed schemes are discussed
Keywords :
elliptic equations; message authentication; mobile radio; public key cryptography; telecommunication security; wireless LAN; confidential communication; cryptography; elliptic curve authenticated key exchange; encrypted key exchange method; exponential key exchange method; key infrastructure; key setup procedures; mobile framework; mutual authentication; proxy servers; security components; technique optimization; wireless framework; Australia; Authentication; Certification; Communication system security; Cryptographic protocols; Elliptic curve cryptography; Elliptic curves; Mobile communication; Public key; Public key cryptography;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Knowledge-Based Intelligent Information Engineering Systems, 1999. Third International Conference
Conference_Location :
Adelaide, SA
Print_ISBN :
0-7803-5578-4
Type :
conf
DOI :
10.1109/KES.1999.820235
Filename :
820235
Link To Document :
بازگشت