Efficient provably-secure privacy-preserving signature-based key establishment protocol

被引:10
作者
Abbasinezhad-Mood, Dariush [1 ]
Ostad-Sharif, Arezou [1 ]
Nikooghadam, Morteza [1 ]
机构
[1] Imam Reza Univ, Dept Comp Engn & Informat Technol, Mashhad, Razavi Khorasan, Iran
关键词
Authentication; Key establishment; Privacy protection; Provable security; Signature; REMOTE USER AUTHENTICATION; SMART-CARD; SCHEME; AGREEMENT; DESIGN; CRYPTANALYSIS;
D O I
10.1016/j.adhoc.2019.102062
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Assuring the security and privacy of users in today's ever-growing digital communications is of prime significance. In a digital communication, in order to preserve the identities and confidential information of individuals, and more significantly, to prevent any unauthorized access and manipulation, the user and server need to establish a shared key. In recent years, a number of key establishment protocols have been put forward to keep the integrity, confidentiality, and anonymity of participants. Nonetheless, investigating the literature reveals the fact that the existing schemes cannot entirely assuage the desired security requirements. Therefore, in this paper, considering the computational efficiency, we propose a novel privacy-preserving signature-based key establishment protocol, which can guarantee subsequent secure communications of users and servers. To indicate that the proposed scheme can withstand the known attacks, we present a rigorous formal security proof and verification by utilization of two stateof-the-art techniques, i.e., the random oracle model and ProVerif tool. Further, to show that the proposed protocol has proper performance, we compare our scheme with several recently-published schemes. The achieved results evince that the proposed scheme has a proper level of efficiency and is the best in terms of security provision. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页数:12
相关论文
共 42 条
[1]  
Abbasinezhad-Mood D., 2019, IEEE T IND ELECT
[2]   Efficient Anonymous Password-Authenticated Key Exchange Protocol to Read Isolated Smart Meters by Utilization of Extended Chebyshev Chaotic Maps [J].
Abbasinezhad-Mood, Dariush ;
Nikooghadam, Morteza .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (11) :4815-4828
[3]   Design of an enhanced message authentication scheme for smart grid and its performance analysis on an ARM Cortex-M3 microcontroller [J].
Abbasinezhad-Mood, Dariush ;
Nikooghadam, Morteza .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 40 :9-19
[4]   An Anonymous ECC-Based Self-Certified Key Distribution Scheme for the Smart Grid [J].
Abbasinezhad-Mood, Dariush ;
Nikooghadam, Morteza .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2018, 65 (10) :7996-8004
[5]   Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications [J].
Abbasinezhad-Mood, Dariush ;
Nikooghadam, Morteza .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 :47-57
[6]  
[Anonymous], CRYPT SSL TLS TOOLK
[7]   Non-unitary leptonic mixing and leptogenesis [J].
Antusch, Stefan ;
Blanchet, Steve ;
Blennow, Mattias ;
Fernandez-Martinez, Enrique .
JOURNAL OF HIGH ENERGY PHYSICS, 2010, (01)
[8]  
Blake-Wilson S, 1997, LECT NOTES COMPUT SC, V1355, P30, DOI 10.1007/BFb0024447
[9]  
Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453
[10]  
Chaturvedi A, 2017, J KING SAUD UNIV-COM, V29, P54, DOI 10.1016/j.jksuci.2014.12.007