An improvement on a three-party authentication key exchange protocol using elliptic curve cryptography

被引:3
作者
Tan, Zuowen [1 ,2 ]
机构
[1] Department of Computer Science and Technology, School of Information Technology, Jiangxi University of Finance and Economics, Nanchang 330032, Jiangxi Province, China
[2] Key Lab of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350007, Fujian Province, China
关键词
Authentication; -; Geometry;
D O I
暂无
中图分类号
学科分类号
摘要
The authentication key exchange protocol enables communication participants to authenticate each other and agree on the session key over an insecure public network. Recently, a three-party authentication key exchange protocol based on Elliptic curve cryptograph is proposed. In this paper, we improve the three-party encrypted key exchange protocol by bilinear maps. The proposed three-party authentication key exchange protocol is provable secure under Computational Diffie-Hellman assumptions in the standard model. Furthermore, the novel protocol is more efficient.
引用
收藏
相关论文
共 50 条
  • [41] A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography
    Chen, Tien-ho
    Yeh, Hsiu-lien
    Liu, Pin-chuan
    Hsiang, Han-chen
    Shih, Wei-kuan
    COMMUNICATION AND NETWORKING, PT I, 2010, 119 : 46 - 55
  • [42] An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography
    Qiu, Shuming
    Xu, Guosheng
    Ahmad, Haseeb
    Xu, Guoai
    Qiu, Xinping
    Xu, Hong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (02): : 978 - 1002
  • [43] Comment on “A practical protocol for three-party authenticated quantum key distribution”
    Yi-Ping Luo
    Wen-Han Chou
    Tzonelih Hwang
    Quantum Information Processing, 2017, 16
  • [44] LSPA-SGs: A lightweight and secure protocol for authentication and key agreement based Elliptic Curve Cryptography in smart grids
    Taqi, Susan A. Mohammed
    Jalili, Saeed
    ENERGY REPORTS, 2022, 8 : 153 - 164
  • [45] Provably secure three-party password-authenticated key exchange
    Lin, CL
    Wen, HA
    Hwang, T
    Sun, HM
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (11) : 2990 - 3000
  • [46] A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography
    Chaudhry, Shehzad Ashraf
    Khan, Muhammad Tawab
    Khan, Muhammad Khurram
    Shon, Taeshik
    JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (11)
  • [47] A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography
    Shehzad Ashraf Chaudhry
    Muhammad Tawab Khan
    Muhammad Khurram Khan
    Taeshik Shon
    Journal of Medical Systems, 2016, 40
  • [48] Comment on "A practical protocol for three-party authenticated quantum key distribution"
    Luo, Yi-Ping
    Chou, Wen-Han
    Hwang, Tzonelih
    QUANTUM INFORMATION PROCESSING, 2017, 16 (05)
  • [49] An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography
    Chaudhry, Shehzad Ashraf
    Naqvi, Husnain
    Mahmood, Khalid
    Ahmad, Hafiz Farooq
    Khan, Muhammad Khurram
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) : 5355 - 5373
  • [50] Elliptic Curve Cryptography Based Authentication Protocol for Small Computational Capacity RFID Systems
    Godor, Gyozo
    Szendi, Peter
    Imre, Sandor
    Q2SWINET 2010: PROCEEDINGS OF THE SIXTH ACM SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2010, : 98 - 105