An elliptic curve based authenticated key agreement protocol for wireless security

被引:0
|
作者
Shin, SeongHan [1 ]
Kobara, Kazukuni [1 ]
Imai, Hideki [1 ]
机构
[1] Natl Inst Adve Ind Sci & Technol AIST, Res Ctr Informat Security, Chiyoda Ku, Tokyo 1010021, Japan
来源
COMPUTATIONAL INTELLIGENCE AND SECURITY | 2007年 / 4456卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
When we consider wireless security, it is strongly preferable to use password-based authentication and the elliptic curve based Diffie-Hellman protocol since the former provides a user-friendly authentication method and the latter is an efficient key agreement protocol. However, this combination does riot necessarily guarantee security against off-line dictionary attacks (especially, "partition attacks"). In this paper, we propose an elliptic curve based authenticated key agreement (called EC-AKA) protocol that is secure against partition attacks as well as suitable for the following situation: (1) a client, who communicates with many different servers, remembers only one password and has insecure devices; (2) the counterpart servers are riot perfectly secure against several attacks; (3) neither PKI (Public Key Infrastructures) nor TRM (Tamper Resistance Modules) is available. The EC-AKA protocol is secure under the elliptic curve Diffie-Hellman problem in the random oracle model. We also show that; the EC-AKA protocol achieves more strengthened security properties and efficiency compared with the existing protocols (employed in the IEEE 802.1x).
引用
收藏
页码:767 / 777
页数:11
相关论文
共 50 条
  • [1] Elliptic curve based authenticated key agreement protocol for wireless security
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1096 - 1100
  • [2] An efficient elliptic curve cryptography based authenticated key agreement protocol for wireless LAN security
    Azim, MA
    Jamalipour, A
    2005 WORKSHOP ON HIGH PERFORMANCE SWITCHING AND ROUTING, 2005, : 376 - 380
  • [3] Exploration of Schemes for Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptosystem
    Nimbhorkar, S. U.
    Malik, L. G.
    2013 SIXTH INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING AND TECHNOLOGY (ICETET 2013), 2013, : 134 - 135
  • [4] An anonymous SIP authenticated key agreement protocol based on elliptic curve cryptography
    Lu, Yanrong
    Zhao, Dawei
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2022, 19 (01) : 66 - 85
  • [5] An Authenticated Constant Round Group Key Agreement Protocol Based on Elliptic Curve Cryptography
    Zhu Liehuang
    Liao Lejian
    Li Wenzhuo
    Zhang Zijian
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (8B): : 131 - 134
  • [6] AN EFFICIENT AND SECURE THREE-PASS AUTHENTICATED KEY AGREEMENT ELLIPTIC CURVE BASED PROTOCOL
    Mohammad, Zeyad
    Hsu, Chien-Lung
    Chen, Yaw-Chung
    Lo, Chi-Chun
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (03): : 1273 - 1284
  • [7] A Novel Authenticated Group Key Agreement Protocol Based on Elliptic Curve Diffie-Hellman
    Tang Hong
    Zhu Liehuang
    Zhang Zijian
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4611 - 4614
  • [8] Conference key agreement protocol based on elliptic curve
    Cai, Yong-Quan
    Wang, Ya-Li
    Beijing Gongye Daxue Xuebao / Journal of Beijing University of Technology, 2007, 33 (08): : 870 - 873
  • [9] On the Security of Certificateless Authenticated Key Agreement Protocol
    Hou Meng-bo
    Xu Qiu-liang
    2009 IEEE INTERNATIONAL SYMPOSIUM ON IT IN MEDICINE & EDUCATION, VOLS 1 AND 2, PROCEEDINGS, 2009, : 974 - 979
  • [10] A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications
    Abi-Char, Pierre E.
    Mhamed, Abdallah
    El-Hassan, Bachar
    NGMAST 2007: 2007 INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES, 2007, : 235 - +