Skip to main content
placeholder image

Key establishment ¿ secrecy, authentication and anonymity

Chapter


Abstract


  • Authenticated Key Establishment (AKE) is a method for two or more parties communicating over an insecure network to establish a shared symmetric key in a secure and authenticated manner. This shared key, generally called session key, will then be used for establishing a secure communication channel among the parties. In this chapter, we will discuss some advanced topics regarding AKE for interconnected wired and wireless networks. Those topics include two-factor AKE, AKE in roaming networks, and user privacy protection in AKE protocols.

Publication Date


  • 2011

Citation


  • Yang, G., Wong, D. S., & Deng, X. (2011). Key establishment ¿ secrecy, authentication and anonymity. In Handbook of Security and Networks (pp. 223-244). doi:10.1142/9789814273046_0008

International Standard Book Number (isbn) 13


  • 9789814273039

Scopus Eid


  • 2-s2.0-84967638988

Web Of Science Accession Number


Book Title


  • Handbook of Security and Networks

Start Page


  • 223

End Page


  • 244

Abstract


  • Authenticated Key Establishment (AKE) is a method for two or more parties communicating over an insecure network to establish a shared symmetric key in a secure and authenticated manner. This shared key, generally called session key, will then be used for establishing a secure communication channel among the parties. In this chapter, we will discuss some advanced topics regarding AKE for interconnected wired and wireless networks. Those topics include two-factor AKE, AKE in roaming networks, and user privacy protection in AKE protocols.

Publication Date


  • 2011

Citation


  • Yang, G., Wong, D. S., & Deng, X. (2011). Key establishment ¿ secrecy, authentication and anonymity. In Handbook of Security and Networks (pp. 223-244). doi:10.1142/9789814273046_0008

International Standard Book Number (isbn) 13


  • 9789814273039

Scopus Eid


  • 2-s2.0-84967638988

Web Of Science Accession Number


Book Title


  • Handbook of Security and Networks

Start Page


  • 223

End Page


  • 244