An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security

被引:162
作者
He Debiao [1 ]
Chen Jianhua [1 ]
Hu Jin [1 ]
机构
[1] Wuhan Univ, Sch Math & Stat, Wuhan 430072, Hubei, Peoples R China
关键词
ID-based; Mutual authentication; Key agreement; Elliptic curve cryptosystem; Perfect forward secrecy; Modular multiplication; USER AUTHENTICATION; EXCHANGE PROTOCOL; SCHEME;
D O I
10.1016/j.inffus.2011.01.001
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, lots of remote user authentication schemes are implemented on elliptic curve cryptosystem (ECC) to reduce the computation loads for mobile devices. However, most of those remote user authentication schemes on ECC suffer from different attacks and can not provide provable security. Therefore. we propose an ID-based remote mutual authentication with key agreement scheme on ECC in this paper. The proposed scheme not only provides mutual authentication but also supports a session key agreement between the user and the server. The scheme also provides the known session key security, the perfect forward secrecy, the no key-compromise impersonation, the no unknown key-share and the no key control. Compared with the related works, the proposed scheme is more efficient and practical for mobile devices. We also give a security proof under the random oracle. Crown Copyright (C) 2011 Published by Elsevier B.V. All rights reserved.
引用
收藏
页码:223 / 230
页数:8
相关论文
共 29 条
  • [1] Abi-Char PE, 2007, INT CONF NEXT GEN, P235
  • [2] [Anonymous], IMPROVEMENT RECENTLY
  • [3] [Anonymous], 2010, INT J NETW SECUR
  • [4] [Anonymous], MIR LIB
  • [5] Blake-Wilson S, 1997, LECT NOTES COMPUT SC, V1355, P30, DOI 10.1007/BFb0024447
  • [6] Short signatures from the Weil pairing
    Boneh, D
    Lynn, B
    Shacham, H
    [J]. JOURNAL OF CRYPTOLOGY, 2004, 17 (04) : 297 - 319
  • [7] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [8] IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
    Cao, Xuefei
    Kou, Weidong
    Dang, Lanjun
    Zhao, Bin
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (04) : 659 - 667
  • [9] Identify-Based Authenticated Key Agreement Protocols without Bilinear Pairings
    Cao, Xuefei
    Kou, Weidong
    Yu, Yong
    Sun, Rong
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (12) : 3833 - 3836
  • [10] Chen L., SECURITY PROOF SAKAI