DocumentCode
351157
Title
An elliptic curve authenticated key exchange based approach to key infrastructure
Author
Koduri, Praveen ; Mahajan, Anant ; Montague, Paul ; Moseley, Philip
Author_Institution
KES, Univ. of South Australia, The Levels, SA, Australia
fYear
1999
fDate
36495
Firstpage
513
Lastpage
517
Abstract
Introduces an elliptic curve analogue to the existing exponential/encrypted key exchange methods, with a view to optimizing such techniques for implementation within a mobile (wireless) framework. The complete scheme of how these methods can be adopted, along with the other security components (e.g. proxies) in the existing infrastructure is analysed. In this paper, we discuss the complete key setup procedures and various scenarios describing how confidential communication is performed once the key has been set up and mutual authentication achieved. The advantages of the proposed schemes are discussed
Keywords
elliptic equations; message authentication; mobile radio; public key cryptography; telecommunication security; wireless LAN; confidential communication; cryptography; elliptic curve authenticated key exchange; encrypted key exchange method; exponential key exchange method; key infrastructure; key setup procedures; mobile framework; mutual authentication; proxy servers; security components; technique optimization; wireless framework; Australia; Authentication; Certification; Communication system security; Cryptographic protocols; Elliptic curve cryptography; Elliptic curves; Mobile communication; Public key; Public key cryptography;
fLanguage
English
Publisher
ieee
Conference_Titel
Knowledge-Based Intelligent Information Engineering Systems, 1999. Third International Conference
Conference_Location
Adelaide, SA
Print_ISBN
0-7803-5578-4
Type
conf
DOI
10.1109/KES.1999.820235
Filename
820235
Link To Document