Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties

Mobile authentication can be used to verify a mobile user’s identity. Normally this is accomplished through the use of logon passwords, but this can raise the secret-key agreement problem between entities. This issue can be resolved by using a public-key cryptosystem, but mobile devices have limited...

Full description

Bibliographic Details
Main Author: Shin-Yan Chiou
Format: Article
Language:English
Published: Hindawi Limited 2013-01-01
Series:Mathematical Problems in Engineering
Online Access:http://dx.doi.org/10.1155/2013/858579
id doaj-7c42ffa69f834619ae815f0e049bac93
record_format Article
spelling doaj-7c42ffa69f834619ae815f0e049bac932020-11-24T21:05:58ZengHindawi LimitedMathematical Problems in Engineering1024-123X1563-51472013-01-01201310.1155/2013/858579858579Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted PartiesShin-Yan Chiou0Department of Electrical Engineering, Chang Gung University, 259 Wen-Hwa 1st Road, Kwei-Shan, Taoyuan 333, TaiwanMobile authentication can be used to verify a mobile user’s identity. Normally this is accomplished through the use of logon passwords, but this can raise the secret-key agreement problem between entities. This issue can be resolved by using a public-key cryptosystem, but mobile devices have limited computation ability and battery capacity and a PKI is needed. In this paper, we propose an efficient, non-PKI, authenticated, and blind issued symmetric key protocol for mobile access control systems. An easy-to-deploy authentication and authenticated key agreement system is designed such that empowered mobile devices can directly authorize other mobile devices to exchange keys with the server upon authentication using a non-PKI system without trusted parties. Empowered mobile users do not know the key value of the other mobile devices, preventing users from impersonating other individuals. Also, for security considerations, this system can revoke specific keys or keys issued by a specific user. The scheme is secure, efficient, and feasible and can be implemented in existing environments.http://dx.doi.org/10.1155/2013/858579
collection DOAJ
language English
format Article
sources DOAJ
author Shin-Yan Chiou
spellingShingle Shin-Yan Chiou
Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties
Mathematical Problems in Engineering
author_facet Shin-Yan Chiou
author_sort Shin-Yan Chiou
title Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties
title_short Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties
title_full Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties
title_fullStr Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties
title_full_unstemmed Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties
title_sort authenticated blind issuing of symmetric keys for mobile access control system without trusted parties
publisher Hindawi Limited
series Mathematical Problems in Engineering
issn 1024-123X
1563-5147
publishDate 2013-01-01
description Mobile authentication can be used to verify a mobile user’s identity. Normally this is accomplished through the use of logon passwords, but this can raise the secret-key agreement problem between entities. This issue can be resolved by using a public-key cryptosystem, but mobile devices have limited computation ability and battery capacity and a PKI is needed. In this paper, we propose an efficient, non-PKI, authenticated, and blind issued symmetric key protocol for mobile access control systems. An easy-to-deploy authentication and authenticated key agreement system is designed such that empowered mobile devices can directly authorize other mobile devices to exchange keys with the server upon authentication using a non-PKI system without trusted parties. Empowered mobile users do not know the key value of the other mobile devices, preventing users from impersonating other individuals. Also, for security considerations, this system can revoke specific keys or keys issued by a specific user. The scheme is secure, efficient, and feasible and can be implemented in existing environments.
url http://dx.doi.org/10.1155/2013/858579
work_keys_str_mv AT shinyanchiou authenticatedblindissuingofsymmetrickeysformobileaccesscontrolsystemwithouttrustedparties
_version_ 1716767167845761024