Title :
Generating authentication data without keeping a private key for Mobility
Author :
Yang, Jong-Phil ; Rhee, Kyung-Hyune
Author_Institution :
Dept. of Comput. Sci., Pukyong Nat.´´I Univ.
Abstract :
In the near future, people will wish to access many kinds of heterogeneous networks to use their services anytime and anywhere. Owing to the heterogeneity of networks, there must be many kinds of protocols to guarantee secure services. The mobile device can depend on a middleware for accessing services in the heterogeneous networks and the middleware helps the mobile device to communicate with services without knowing concrete protocols. If a secure channel is necessary, the middleware may access a private key in the mobile device to perform a security protocol. In this paper, we focus on the security of a private key in the mobile device against malicious middlewares. To do so, we introduce two models for a user to protect his/her private key against malicious middlewares by generating authentication data (e.g., digital signatures) without keeping the private key in the mobile device
Keywords :
computer crime; cryptography; message authentication; middleware; mobile computing; mobility management (mobile radio); protocols; authentication data generation; digital signature; heterogeneous network; malicious middleware; mobile device; private key; security protocol; Access protocols; Authentication; Computer networks; Computer science; Concrete; Data security; Digital signatures; Java; Middleware; Mobile communication;
Conference_Titel :
Parallel and Distributed Systems, 2005. Proceedings. 11th International Conference on
Conference_Location :
Fukuoka
Print_ISBN :
0-7695-2281-5
DOI :
10.1109/ICPADS.2005.160