On the design of provably secure identity-based authentication and key exchange protocol for heterogeneous wireless access

被引:0
|
作者
Jiang, J [1 ]
He, C [1 ]
Jiang, LG [1 ]
机构
[1] Shanghai Jiao Tong Univ, Inst Modern Commun, Shanghai 200030, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Heavily based on the provable security model of Canetti and Krawczyk (CK-model), an identity-based authentication and key exchange (AKE) protocol which uses pairings is proposed for securing heterogeneous wireless access in this paper. By using the CK-model approach, an ideal and secure key exchange protocol was first proposed. Then a full-fledged authenticator is built to provide authentication of the ideal protocol. This completes a practical AKE protocol for heterogeneous environment while carrying the security proof. Analysis shows that our protocol is secure with partial forward secrecy, and efficient for considering the asymmetric wireless environment.
引用
收藏
页码:972 / 981
页数:10
相关论文
共 50 条
  • [21] Provably secure identity-based threshold key escrow from pairing
    Long, Yu
    Gong, Zheng
    Chen, Kefei
    Liu, Shengli
    International Journal of Network Security, 2009, 8 (03) : 227 - 234
  • [22] PROVABLY SECURE KEY-UPDATING SCHEMES IN IDENTITY-BASED SYSTEMS
    SHINOZAKI, S
    ITOH, T
    FUJIOKA, A
    TSUJII, S
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 473 : 16 - 30
  • [23] A Secure Network Access Approach Based on Heterogeneous Key Exchange Protocol
    Xia, Yingjie
    Kuang, Li
    Mao, Kuang
    ADVANCES IN INFORMATION TECHNOLOGY AND EDUCATION, PT I, 2011, 201 : 62 - 69
  • [24] An Identity-Based Key-Exchange Protocol
    ZHANG Ya-juan
    Wuhan University Journal of Natural Sciences, 2005, (01) : 235 - 238
  • [25] AN IDENTITY-BASED KEY-EXCHANGE PROTOCOL
    GUNTHER, CG
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 29 - 37
  • [26] Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    INFORMATION SCIENCES, 2011, 181 (19) : 4318 - 4329
  • [27] A One-Pass Identity-Based Authentication and Key Agreement Protocol for Wireless Roaming
    Bao, Qingrui
    Hou, Mengbo
    Choo, Kim-Kwang Raymond
    2016 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2016, : 443 - 447
  • [28] Provably secure cross-domain authentication key agreement protocol based on heterogeneous signcryption scheme
    Tao, Fushou
    Shi, Ting
    Li, Shijin
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 2261 - 2266
  • [29] Smart Home Security: A Distributed Identity-based Security Protocol for Authentication and Key Exchange
    Rathore, M. Mazhar
    Bentafat, Elmahdi
    Bakiras, Spiridon
    2019 28TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2019,
  • [30] A Provably Secure Authenticated Key Exchange Protocol
    Zhang, Lijiang
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 292 - 297