Abstract
Future mobile communications networks, so called third generation systems, may need end-to-end security in some applications involving value-added services such as providing secure communications between a user and a bank in electronic commerce. The provision of end-to-end security may require mechanisms for key recovery. In this paper we identify security flaws with a previous published protocol for key recovery in such networks. A new key recovery protocol which overcomes these flaws is presented.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
ACTS AC095, ASPeCT Deliverable D02, Initial Report on Security Requirements, AC095/ATEA/W21/DS/P/02/B (February 1997), Available from http://www.esat.kuleuven.ac.be/cosic/aspect/
Advanced Security for Personal Communications Technologies, http://www.esat.kuleuven.ac.be/cosic/aspect/index.html
Asokan, N., Shoup, V., Waidner, M.: Optimistic Fair Exchange of Digital Signatures. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 591–606. Springer, Heidelberg (1998)
Black, U.: Third Generation Mobile Systems (TGMSs). In: Second Generation Mobile & Wireless Networks. Parentice Hall (1999)
Pfitzmann, B., Waidner, M.: How to Break Fraud-Detectable Key Recovery. Operating Systems Review 21, 23–28 (1998)
Buhanal, K., et al.: IMT-2000: Service Providers Perspective. IEEE Personal Communications (August 1997)
CESG, Securing Electronic Mail within HMG - part 1: Infrastructure and Protocol, document T/3113TL/2776/11 (March 1996), available at http://www.rdg.opengroup.org/public/tech/security/pki/casm/casm.htm
Denning, D., Branstad, D.: A Taxonomy for Key Escrow Encryption systems. Communications of the ACM 39, 34–40 (1996)
Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory 22, 644–654 (1976)
Diffie, W., van Oorschot, P., Wiener, M.: Authentication and Authenticated Key Exchanges. Designs Codes and Cryptography 2, 107–125 (1992)
ETSI TC-STAG, Security Techniques Advisory Group (STAG); Definition of User Requirements for Lawful Interception of telecommunications; Requirements of the Law Enforcement Agencies, ETR 331 (December 1996)
ETSI SMG10, Draft UMTS 33.21 version 2.0.0, Universal Mobile Telecommunications System (UMTS): Security Requirements (February 1999)
ETSI TC Security, Specification for Trusted Third Party Services: Part1 Key Management and Key Escrow/Recovery, DEN/SEC-003001x, Draft Version 1,0 edition 2 (November 11, 1997)
Horn, G., Preneel, B.: Authentication and payment in future mobile systems. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 277–293. Springer, Heidelberg (1998)
Martin, K.: Applying Cryptography within the ASPeCT Project. Information Security Technical Report 2(4), 41–53 (1998)
Ojanpera, T., Prasad, R.: IMT-2000 Applications. In: Ojanpera, T., Prasad, R. (eds.) Widenband CDMA for Third Generation Mobile Communication, pp. 65–76. Artech House Publishers (1998)
Rantos, K., Mitchell, C.: Key recovery in ASPeCT authentication and initialisation of payment protocol. In: Proceedings of ACTS Mobile Summit, Sorrento, Italy (June 1999)
Schnorr, C.P.: Efficient Identification and Signatures for Smart Cards In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 239–252. Springer, Heidelberg (1990)
Stadler, M.: Publicly Verifiable Secret Sharing. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 190–199. Springer, Heidelberg (1996)
US Department of Commerce, National Institute of Standard and Technology, FIPS PUB 185, Escrowed Encryption Standard (February 1994)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nieto, J.G., Park, D., Boyd, C., Dawson, E. (2000). Key Recovery in Third Generation Wireless Communication Systems. In: Imai, H., Zheng, Y. (eds) Public Key Cryptography. PKC 2000. Lecture Notes in Computer Science, vol 1751. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-46588-1_16
Download citation
DOI: https://doi.org/10.1007/978-3-540-46588-1_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66967-8
Online ISBN: 978-3-540-46588-1
eBook Packages: Springer Book Archive