A fresh Two-party Authentication Key Exchange Protocol for Mobile Environment

被引:0
作者
Yang, H. B. [1 ]
Chen, J. H. [1 ]
Zhang, Y. Y. [1 ]
机构
[1] Wuhan Univ, Sch Math & Stat, Wuhan 430072, Peoples R China
来源
PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY AND MANAGEMENT SCIENCE (ITMS 2015) | 2015年 / 34卷
关键词
Mobile environment; 2PAKE; Elliptic curve cryptosystem; Mutual authentication; SCHEME;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Mobile environment has been used in large area range of network. In order to communicate securely, a number of schemes also have been proposed. The typical protocol which is two-party authentication key exchange (2PAKE) protocol is based on elliptic curve cryptosystem (ECC) in public networks. In this paper, we propose a two-party authentication key exchange protocol. Our protocol is indeed safer and meets the needs. It achieves efficiency in computational cost. Hence, the proposed protocol has a great contribution to the area of mobile environment.
引用
收藏
页码:933 / 936
页数:4
相关论文
共 19 条
[1]  
Bellar M, 2000, ADV CRYPTOLOGY EUROC, P232
[2]  
Bellare M., 1993, P ANN INT CRYPT C SA, P232, DOI [DOI 10.1007/3-540-48329-2_21, 10.1007/3-540-48329-2_21]
[3]  
Bellovin S. M., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P72, DOI 10.1109/RISP.1992.213269
[4]   Two ID-based authenticated schemes with key agreement for mobile environments [J].
Chou, Chih-Ho ;
Tsai, Kuo-Yu ;
Lu, Chung-Fu .
JOURNAL OF SUPERCOMPUTING, 2013, 66 (02) :973-988
[5]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[6]  
Hankerson D.., 2004, Guide to Elliptic Curve Cryptography
[7]   An Id-Based Three-Party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-Commerce Environments [J].
He, Debiao ;
Chen, Yitao ;
Chen, Jianhua .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2013, 38 (08) :2055-2061
[8]  
He DB, 2011, KUWAIT J SCI ENG, V38, P55
[9]   An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security [J].
He Debiao ;
Chen Jianhua ;
Hu Jin .
INFORMATION FUSION, 2012, 13 (03) :223-230
[10]  
Kaliski B. S. Jr., 2001, ACM Transactions on Information and Systems Security, V4, P275, DOI 10.1145/501978.501981