An improvement on a three-party authentication key exchange protocol using elliptic curve cryptography

被引:3
作者
Tan, Zuowen [1 ,2 ]
机构
[1] Department of Computer Science and Technology, School of Information Technology, Jiangxi University of Finance and Economics, Nanchang 330032, Jiangxi Province, China
[2] Key Lab of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350007, Fujian Province, China
关键词
Authentication; -; Geometry;
D O I
暂无
中图分类号
学科分类号
摘要
The authentication key exchange protocol enables communication participants to authenticate each other and agree on the session key over an insecure public network. Recently, a three-party authentication key exchange protocol based on Elliptic curve cryptograph is proposed. In this paper, we improve the three-party encrypted key exchange protocol by bilinear maps. The proposed three-party authentication key exchange protocol is provable secure under Computational Diffie-Hellman assumptions in the standard model. Furthermore, the novel protocol is more efficient.
引用
收藏
相关论文
共 50 条
  • [21] Efficient and secure three-party authenticated key exchange protocol for mobile environments
    Chih-ho Chou
    Kuo-yu Tsai
    Tzong-chen Wu
    Kuo-hui Yeh
    Journal of Zhejiang University SCIENCE C, 2013, 14 : 347 - 355
  • [22] A communication-efficient three-party password authenticated key exchange protocol
    Chang, Ting-Yi
    Hwang, Min-Shiang
    Yang, Wei-Pang
    INFORMATION SCIENCES, 2011, 181 (01) : 217 - 226
  • [23] An authenticated group key transfer protocol using elliptic curve cryptography
    Jaiswal, Priyanka
    Tripathi, Sachin
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (04) : 857 - 864
  • [24] Cryptanalysis of a simple three-party password-based key exchange protocol
    Yoon, Eun-Jun
    Yoo, Kee-Young
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (04) : 532 - 542
  • [25] Efficient and secure three-party authenticated key exchange protocol for mobile environments
    Chou, Chih-ho
    Tsai, Kuo-yu
    Wu, Tzong-chen
    Yeh, Kuo-hui
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2013, 14 (05): : 347 - 355
  • [26] Elliptic Curve Cryptography on E-passport Authentication Protocol
    Saoudi, Safa
    Yousfi, Souheib
    Robbana, Riadh
    2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 1253 - 1260
  • [27] Efficient three-party encrypted key exchange using trapdoor functions
    Lee, Tian-Fu
    Chang, I-Pin
    Wang, Ching-Cheng
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (11) : 1353 - 1358
  • [28] A round- and computation-efficient three-party authenticated key exchange protocol
    Chen, Tzung-Her
    Lee, Wei-Bin
    Chen, Hsing-Bai
    JOURNAL OF SYSTEMS AND SOFTWARE, 2008, 81 (09) : 1581 - 1590
  • [29] A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
    He, Debiao
    Chen, Jianhua
    Chen, Yitao
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1423 - 1429
  • [30] A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography
    Reddy, Alavalapati Goutham
    Das, Ashok Kumar
    Yoon, Eun-Jun
    Yoo, Kee-Young
    IEEE ACCESS, 2016, 4 : 4394 - 4407