This paper presents two methods for securely realizing caller-authenticated and callee-specified calls over telecommunication networks with terminals that accept IC cards having KPS-based cryptographic functions. In the proposed protocols, users can verify that the partner is the proper owner of a certain ID or a certain pen name. Users' privacy is protected even if they do the caller-authenticated and callee-specified calls and do not pay their telephone charge in advance.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Tomoyuki ASANO, Tsutomu MATSUMOTO, Hideki IMAI, "Methods to Securely Realize Caller-Authenticated and Callee-Specified Telephone Calls" in IEICE TRANSACTIONS on Fundamentals,
vol. E76-A, no. 1, pp. 88-95, January 1993, doi: .
Abstract: This paper presents two methods for securely realizing caller-authenticated and callee-specified calls over telecommunication networks with terminals that accept IC cards having KPS-based cryptographic functions. In the proposed protocols, users can verify that the partner is the proper owner of a certain ID or a certain pen name. Users' privacy is protected even if they do the caller-authenticated and callee-specified calls and do not pay their telephone charge in advance.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/e76-a_1_88/_p
Copy
@ARTICLE{e76-a_1_88,
author={Tomoyuki ASANO, Tsutomu MATSUMOTO, Hideki IMAI, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Methods to Securely Realize Caller-Authenticated and Callee-Specified Telephone Calls},
year={1993},
volume={E76-A},
number={1},
pages={88-95},
abstract={This paper presents two methods for securely realizing caller-authenticated and callee-specified calls over telecommunication networks with terminals that accept IC cards having KPS-based cryptographic functions. In the proposed protocols, users can verify that the partner is the proper owner of a certain ID or a certain pen name. Users' privacy is protected even if they do the caller-authenticated and callee-specified calls and do not pay their telephone charge in advance.},
keywords={},
doi={},
ISSN={},
month={January},}
Copy
TY - JOUR
TI - Methods to Securely Realize Caller-Authenticated and Callee-Specified Telephone Calls
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 88
EP - 95
AU - Tomoyuki ASANO
AU - Tsutomu MATSUMOTO
AU - Hideki IMAI
PY - 1993
DO -
JO - IEICE TRANSACTIONS on Fundamentals
SN -
VL - E76-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 1993
AB - This paper presents two methods for securely realizing caller-authenticated and callee-specified calls over telecommunication networks with terminals that accept IC cards having KPS-based cryptographic functions. In the proposed protocols, users can verify that the partner is the proper owner of a certain ID or a certain pen name. Users' privacy is protected even if they do the caller-authenticated and callee-specified calls and do not pay their telephone charge in advance.
ER -