Generating authentication data without keeping a private key for Mobility

JP Yang, KH Rhee - 11th International Conference on Parallel …, 2005 - ieeexplore.ieee.org
JP Yang, KH Rhee
11th International Conference on Parallel and Distributed Systems …, 2005ieeexplore.ieee.org
In the near future, people will wish to access many kinds of heterogeneous networks to use
their services anytime and anywhere. Owing to the heterogeneity of networks, there must be
many kinds of protocols to guarantee secure services. The mobile device can depend on a
middleware for accessing services in the heterogeneous networks and the middleware
helps the mobile device to communicate with services without knowing concrete protocols. If
a secure channel is necessary, the middleware may access a private key in the mobile …
In the near future, people will wish to access many kinds of heterogeneous networks to use their services anytime and anywhere. Owing to the heterogeneity of networks, there must be many kinds of protocols to guarantee secure services. The mobile device can depend on a middleware for accessing services in the heterogeneous networks and the middleware helps the mobile device to communicate with services without knowing concrete protocols. If a secure channel is necessary, the middleware may access a private key in the mobile device to perform a security protocol. In this paper, we focus on the security of a private key in the mobile device against malicious middlewares. To do so, we introduce two models for a user to protect his/her private key against malicious middlewares by generating authentication data(e.g., digital signatures) without keeping the private key in the mobile device.
ieeexplore.ieee.org
Showing the best result for this search. See all results