Privacy-enhanced Key Recovery in mobile communication environments

Research output: Contribution to journalArticlepeer-review

Abstract

Generally, in mobile communication environments, Wireless Authentication and Key Establishment (WAKE) protocols are essential for secure information transmission. Key Recovery (KR) protocols, including WAKE protocols, can enable an authorized third party to gain access to encrypted message data under certain lawful circumstances. However, it is not easy to construct secure and strongly privacypreserved KR protocols for mobile communication environments due to mobile hardware resources' limitation. In this paper, we propose a security-enhanced KR protocol and then we construct a privacy-enhanced KR protocol, which is based on the security-enhanced KR protocol, for protecting users' location privacy.

Original languageEnglish
Pages (from-to)82-93
Number of pages12
JournalJournal of Supercomputing
Volume54
Issue number1
DOIs
StatePublished - Oct 2010

Keywords

  • Key Recovery
  • Mobile communications
  • Privacy
  • Security
  • WAKE

Fingerprint

Dive into the research topics of 'Privacy-enhanced Key Recovery in mobile communication environments'. Together they form a unique fingerprint.

Cite this