TY - JOUR
T1 - Privacy-enhanced Key Recovery in mobile communication environments
AU - Park, Jong Hyuk
PY - 2010/10
Y1 - 2010/10
N2 - Generally, in mobile communication environments, Wireless Authentication and Key Establishment (WAKE) protocols are essential for secure information transmission. Key Recovery (KR) protocols, including WAKE protocols, can enable an authorized third party to gain access to encrypted message data under certain lawful circumstances. However, it is not easy to construct secure and strongly privacypreserved KR protocols for mobile communication environments due to mobile hardware resources' limitation. In this paper, we propose a security-enhanced KR protocol and then we construct a privacy-enhanced KR protocol, which is based on the security-enhanced KR protocol, for protecting users' location privacy.
AB - Generally, in mobile communication environments, Wireless Authentication and Key Establishment (WAKE) protocols are essential for secure information transmission. Key Recovery (KR) protocols, including WAKE protocols, can enable an authorized third party to gain access to encrypted message data under certain lawful circumstances. However, it is not easy to construct secure and strongly privacypreserved KR protocols for mobile communication environments due to mobile hardware resources' limitation. In this paper, we propose a security-enhanced KR protocol and then we construct a privacy-enhanced KR protocol, which is based on the security-enhanced KR protocol, for protecting users' location privacy.
KW - Key Recovery
KW - Mobile communications
KW - Privacy
KW - Security
KW - WAKE
UR - http://www.scopus.com/inward/record.url?scp=78149408765&partnerID=8YFLogxK
U2 - 10.1007/s11227-009-0287-4
DO - 10.1007/s11227-009-0287-4
M3 - Article
AN - SCOPUS:78149408765
SN - 0920-8542
VL - 54
SP - 82
EP - 93
JO - Journal of Supercomputing
JF - Journal of Supercomputing
IS - 1
ER -