An Efficient Authentication and Simplified Certificate Status Management for Personal Area Networks

  • Chul Sur
  • Kyung Hyune Rhee
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4238)


Recently the concept of personal PKI was introduced to describe a public key infrastructure specifically designed to support the distribution of public keys in a personal area network. However, traditional public key signature schemes and certificate status management schemes used in the personal PKI concept cause formidable overheads to components in the personal area network since mobile devices constituting the personal area network have limited computational and communication capabilities. In this paper we propose an efficient authentication protocol that eliminates the traditional public key operations on mobile devices without any assistance of a signature server. Moreover, the proposed protocol provides a simplified procedure for certificate status management to alleviate communication and computational costs on mobile devices in the personal area network.


Mobile Device Signature Scheme Authentication Protocol Hash Chain Control Window 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bicakci, K., Baykal, N.: Server assisted signature revisited. In: Topics in Cryptology - CT-RSA 2003, pp. 143–156 (March 2003)Google Scholar
  2. 2.
    Ding, X., Mazzocchi, D., Tsudik, G.: Experimenting with Server-Aided Signatures. In: 2002 Network and Distributed Systems Security Symposium (NDSS 2002) (February 2002)Google Scholar
  3. 3.
    Gehrmann, C., Nyberg, K., Mitchell, C.: The personal CA - PKI for a Personal Area Network. In: Proceedings - IST Mobile & Wireless Communications Summit 2002 (June 2002)Google Scholar
  4. 4.
    Housley, R., Ford, W., Polk, W., Solo, D.: Internet X.509 public key infrastructure certificate and CRL profile, RFC 2459 (January 1999)Google Scholar
  5. 5.
    Jakobsson, M., Leighton, F., Micali, S., Szydlo, M.: Fractal Merkel tree representation and traversal. In: Topics in Cryptology - CT-RSA 2003, pp. 314–326 (2003)Google Scholar
  6. 6.
    Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24(11) (1981)Google Scholar
  7. 7.
    Merkle, R.C.: A digital signatures based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369–378. Springer, Heidelberg (1988)Google Scholar
  8. 8.
    Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)Google Scholar
  9. 9.
    Naor, D., Shenhav, A., Wool, A.: One-Time Signature Revisited: Have They Become Practical?, Cryptology ePrint Archive, Report 2005/442 (2005)Google Scholar
  10. 10.
    Naor, M., Nissim, K.: Certificate revocation and certificate update. In: The 7th USENIX Security Symposium (January 1998)Google Scholar
  11. 11.
    Myers, M., Ankney, R., Malpani, A., Galperin, S., Adams, C.: X.509 Internet public key infrastructure on-line certificate status protocol (OCSP), RFC 2560 (June 1999)Google Scholar
  12. 12.
    Stajano, F., Anderson, R.: The resurrecting duckling: security issues for ad-hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–194. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  13. 13.
    Zhou, J., Fao, F., Deng, R.: An Efficient Public-Key Framework. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 88–99. Springer, Heidelberg (2003)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Chul Sur
    • 1
  • Kyung Hyune Rhee
    • 2
  1. 1.Department of Computer SciencePukyong National UniversityNam-Gu, BusanRepublic of Korea
  2. 2.Division of Electronic, Computer and Telecommunication EngineeringPukyong National University 

Personalised recommendations