Learn More
—Key transfer protocols rely on a mutually trusted key generation center (KGC) to select session keys and transport session keys to all communication entities secretly. Most often, KGC encrypts session keys under another secret key shared with each entity during registration. In this paper, we propose an authenticated key transfer protocol based on secret(More)
The previous conference schemes for mobile communications focus on establishment, distributing and updating of shared key for conferees, which cannot prevent conferees from submitting fraud message or invalid message. The improvement scheme based on verifiable random number which is constructed with interpolating polynomial reduces the probability of(More)
Based on Diffie-Hellman key exchange protocol, an improved remote authentication protocol for value-added services in mobile networks is proposed, with the help of smart card and client account index. The improved scheme which inherits client anonymity and non-repudiation from previous identity-based remote authentication schemes is more efficient without(More)
  • 1