An improvement on a three-party authentication key exchange protocol using elliptic curve cryptography

被引:3
作者
Tan, Zuowen [1 ,2 ]
机构
[1] Department of Computer Science and Technology, School of Information Technology, Jiangxi University of Finance and Economics, Nanchang 330032, Jiangxi Province, China
[2] Key Lab of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350007, Fujian Province, China
关键词
Authentication; -; Geometry;
D O I
暂无
中图分类号
学科分类号
摘要
The authentication key exchange protocol enables communication participants to authenticate each other and agree on the session key over an insecure public network. Recently, a three-party authentication key exchange protocol based on Elliptic curve cryptograph is proposed. In this paper, we improve the three-party encrypted key exchange protocol by bilinear maps. The proposed three-party authentication key exchange protocol is provable secure under Computational Diffie-Hellman assumptions in the standard model. Furthermore, the novel protocol is more efficient.
引用
收藏
相关论文
共 50 条
  • [32] Communication-efficient three-party protocols for authentication and key agreement
    Lee, Tian-Fu
    Liu, Jenn-Long
    Sung, Mei-Jiun
    Yang, Shiueng-Bien
    Chen, Chia-Mei
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2009, 58 (04) : 641 - 648
  • [33] Security analysis and enhancement for three-party password-based authenticated key exchange protocol
    Zhao, Jianjie
    Gu, Dawu
    Zhang, Lei
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (03) : 273 - 278
  • [34] A Three-Party Password Authenticated Key Exchange Protocol Resistant to Stolen Smart Card Attacks
    Chen, Chien-Ming
    Xu, Linlin
    Fang, Weicheng
    Wu, Tsu-Yang
    ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, 2017, 63 : 331 - 336
  • [35] Cryptanalysis of two three-party encrypted key exchange protocols
    Lo, N. W.
    Yeh, Kuo-Hui
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) : 1167 - 1174
  • [36] Construction of elliptic curve cryptography-based authentication protocol for internet of things
    Chhikara, Deepak
    Rana, Saurabh
    Mishra, Ankita
    Mishra, Dheerendra
    SECURITY AND PRIVACY, 2022, 5 (04)
  • [37] A Three-Party Dynamic Identity-Based Authenticated Key Exchange Protocol with Forward Anonymity
    Hongfeng Zhu
    Shuai Geng
    Wireless Personal Communications, 2019, 109 : 1911 - 1924
  • [38] A Three-Party Dynamic Identity-Based Authenticated Key Exchange Protocol with Forward Anonymity
    Zhu, Hongfeng
    Geng, Shuai
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 109 (03) : 1911 - 1924
  • [39] Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    Arshad, R.
    Ikram, N.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 66 (02) : 165 - 178
  • [40] Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    R. Arshad
    N. Ikram
    Multimedia Tools and Applications, 2013, 66 : 165 - 178