On the design of provably secure identity-based authentication and key exchange protocol for heterogeneous wireless access

被引:0
|
作者
Jiang, J [1 ]
He, C [1 ]
Jiang, LG [1 ]
机构
[1] Shanghai Jiao Tong Univ, Inst Modern Commun, Shanghai 200030, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Heavily based on the provable security model of Canetti and Krawczyk (CK-model), an identity-based authentication and key exchange (AKE) protocol which uses pairings is proposed for securing heterogeneous wireless access in this paper. By using the CK-model approach, an ideal and secure key exchange protocol was first proposed. Then a full-fledged authenticator is built to provide authentication of the ideal protocol. This completes a practical AKE protocol for heterogeneous environment while carrying the security proof. Analysis shows that our protocol is secure with partial forward secrecy, and efficient for considering the asymmetric wireless environment.
引用
收藏
页码:972 / 981
页数:10
相关论文
共 50 条
  • [11] RYY++: A Novel Provably Secure Identity-Based Authenticated Key Agreement Protocol
    Li Yang
    Zhu Jianming
    Zhang Ning
    Wang Xiuli
    Zhang Yaoqi
    CHINESE JOURNAL OF ELECTRONICS, 2015, 24 (02) : 332 - 337
  • [12] Provably secure biometric based authentication and key agreement protocol for wireless sensor networks
    Srinivas, Jangirala
    Mishra, Dheerendra
    Mukhopadhyay, Sourav
    Kumari, Saru
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 875 - 895
  • [13] Provably secure biometric based authentication and key agreement protocol for wireless sensor networks
    Jangirala Srinivas
    Dheerendra Mishra
    Sourav Mukhopadhyay
    Saru Kumari
    Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 875 - 895
  • [14] Provably Secure Identity-Based Threshold Decryption on Access Structure
    Qin, Huawang
    Zhu, Xiaohua
    Dai, Yuewei
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 464 - 468
  • [15] A strongly secure identity-based authenticated group key exchange protocol
    TENG JiKai
    WU ChuanKun
    TANG ChunMing
    TIAN YouLiang
    ScienceChina(InformationSciences), 2015, 58 (09) : 98 - 109
  • [16] A strongly secure identity-based authenticated group key exchange protocol
    Teng JiKai
    Wu ChuanKun
    Tang ChunMing
    Tian YouLiang
    SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (09) : 1 - 12
  • [17] Secure Identity-Based Key Establishment Protocol
    Pal, Om
    Saxena, Anupam
    Saquib, Zia
    Menezes, Bernard L.
    COMPUTER NETWORKS AND INFORMATION TECHNOLOGIES, 2011, 142 : 618 - +
  • [18] Provably Secure and Efficient Identity-Based Key Agreement Protocol for Independent PKGs Using ECC
    Farash, Mohammad Dabzinejad
    Attari, Mahmoud Ahmadian
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 5 (01): : 55 - 70
  • [19] A Secure Identity-based Deniable Authentication Protocol for MANETs
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    PROCEEDING OF THE 2019 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2019), 2019, : 91 - 95
  • [20] A Provably Secure Authentication and Key Exchange Protocol in Vehicular Ad Hoc Networks
    Wu, Tsu-Yang
    Lee, Zhiyuan
    Yang, Lei
    Chen, Chien-Ming
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021