By Topic

Hierarchical key establishment protocols based on secure keyed one-way hash functions

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Wei-Chi Ku ; Dept. of Electr. Eng., Nat. Taiwan Univ., Taipei, Taiwan ; Sheng-De Wang

As key establishment protocols (KEP) are usually the initial step for setting up a secure network-based service, they are very important in enabling the required security. Most of the existing KEPs make use of cryptographic algorithms, either secret key or public-key cryptography. However, it is also possible to employ secure keyed one-way hash functions (SKOWHF) in KEP designs. Though several works have been published in this area, they only focus on the small scale networks. In this paper, we first introduce the SKOWHF-based secure trunks and secure channels; then, two rules for KEP construction, KER1 and KER2, are described. Finally, a hierarchical KEP for large scale networks is proposed

Published in:

Information Networking, 1998. (ICOIN-12) Proceedings., Twelfth International Conference on

Date of Conference:

21-23 Jan 1998