Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties
Mobile authentication can be used to verify a mobile user’s identity. Normally this is accomplished through the use of logon passwords, but this can raise the secret-key agreement problem between entities. This issue can be resolved by using a public-key cryptosystem, but mobile devices have limited...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2013-01-01
|
Series: | Mathematical Problems in Engineering |
Online Access: | http://dx.doi.org/10.1155/2013/858579 |
id |
doaj-7c42ffa69f834619ae815f0e049bac93 |
---|---|
record_format |
Article |
spelling |
doaj-7c42ffa69f834619ae815f0e049bac932020-11-24T21:05:58ZengHindawi LimitedMathematical Problems in Engineering1024-123X1563-51472013-01-01201310.1155/2013/858579858579Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted PartiesShin-Yan Chiou0Department of Electrical Engineering, Chang Gung University, 259 Wen-Hwa 1st Road, Kwei-Shan, Taoyuan 333, TaiwanMobile authentication can be used to verify a mobile user’s identity. Normally this is accomplished through the use of logon passwords, but this can raise the secret-key agreement problem between entities. This issue can be resolved by using a public-key cryptosystem, but mobile devices have limited computation ability and battery capacity and a PKI is needed. In this paper, we propose an efficient, non-PKI, authenticated, and blind issued symmetric key protocol for mobile access control systems. An easy-to-deploy authentication and authenticated key agreement system is designed such that empowered mobile devices can directly authorize other mobile devices to exchange keys with the server upon authentication using a non-PKI system without trusted parties. Empowered mobile users do not know the key value of the other mobile devices, preventing users from impersonating other individuals. Also, for security considerations, this system can revoke specific keys or keys issued by a specific user. The scheme is secure, efficient, and feasible and can be implemented in existing environments.http://dx.doi.org/10.1155/2013/858579 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Shin-Yan Chiou |
spellingShingle |
Shin-Yan Chiou Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties Mathematical Problems in Engineering |
author_facet |
Shin-Yan Chiou |
author_sort |
Shin-Yan Chiou |
title |
Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties |
title_short |
Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties |
title_full |
Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties |
title_fullStr |
Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties |
title_full_unstemmed |
Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties |
title_sort |
authenticated blind issuing of symmetric keys for mobile access control system without trusted parties |
publisher |
Hindawi Limited |
series |
Mathematical Problems in Engineering |
issn |
1024-123X 1563-5147 |
publishDate |
2013-01-01 |
description |
Mobile authentication can be used to verify a mobile user’s identity. Normally this is accomplished through the use of logon passwords, but this can raise the secret-key agreement problem between entities. This issue can be resolved by using a public-key cryptosystem, but mobile devices have limited computation ability and battery capacity and a PKI is needed. In this paper, we propose an efficient, non-PKI, authenticated, and blind issued symmetric key protocol for mobile access control systems. An easy-to-deploy authentication and authenticated key agreement system is designed such that empowered mobile devices can directly authorize other mobile devices to exchange keys with the server upon authentication using a non-PKI system without trusted parties. Empowered mobile users do not know the key value of the other mobile devices, preventing users from impersonating other individuals. Also, for security considerations, this system can revoke specific keys or keys issued by a specific user. The scheme is secure, efficient, and feasible and can be implemented in existing environments. |
url |
http://dx.doi.org/10.1155/2013/858579 |
work_keys_str_mv |
AT shinyanchiou authenticatedblindissuingofsymmetrickeysformobileaccesscontrolsystemwithouttrustedparties |
_version_ |
1716767167845761024 |