An Identity Authentication Protocol in Online Social Networks

被引:0
|
作者
Li, Lingjun [1 ]
Zhao, Xinxin [1 ]
Xue, Guoliang [1 ]
机构
[1] Arizona State Univ, Tempe, AZ 85287 USA
来源
7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012) | 2012年
基金
美国国家科学基金会;
关键词
authentication; online social networks; key exchange; SECURITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent success of online social networks (OSNs) motivates the study of security issues in OSNs. A fundamental but challenging security issue in OSNs is to authenticate a friend's real identity. A solution to this issue will benefit a number of OSN security protocols. Existing solutions require users to securely obtain some secret information from their friends before authentication takes place, which is not always possible in OSNs. In this paper, we propose a new authenticated key exchange protocol based on the exclusive secrets shared between friends. It provides identity authentication and key exchange in a plain setting, i.e., users do not need to securely exchange or distribute any information beforehand. The protocol is designed to work with low-entropy input information, because human beings are not good at dealing with a large amount of information. Another advantage of our protocol is its tolerance of input errors considering human error is always a possibility. We prove the security of the protocol in the universal composability (UC) framework and demonstrate its efficiency.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Mapping social identity change in online networks of addiction recovery
    Best, David
    Bliuc, Ana-Maria
    Iqbal, Muhammad
    Upton, Katie
    Hodgkins, Steve
    ADDICTION RESEARCH & THEORY, 2018, 26 (03) : 163 - 173
  • [22] Construction of identity through online social networks: A look from the social constructionism
    Renau Ruiz, Vanessa
    Oberst, Ursula
    Carbonell-Sanchez, Xavier
    ANUARIO DE PSICOLOGIA, 2013, 43 (02): : 159 - 170
  • [23] The influence of online social networks and online social capital on constructing a new graduate students' professional identity
    Heidari, Elham
    Salimi, Ghasem
    Mehrvarz, Mahboobe
    INTERACTIVE LEARNING ENVIRONMENTS, 2023, 31 (01) : 214 - 231
  • [24] User-Friendly Matching Protocol for Online Social Networks
    Tang, Qiang
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 732 - 734
  • [25] Identity-based authentication protocol for grid
    Li Hongwei
    JournalofSystemsEngineeringandElectronics, 2008, (04) : 860 - 865
  • [26] Identity-based deniable authentication protocol
    Shi, Y
    Li, J
    ELECTRONICS LETTERS, 2005, 41 (05) : 241 - 242
  • [27] Identity-based authentication protocol for grid
    Li Hongwei
    Sun Shixin
    Yang Haomiao
    JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2008, 19 (04) : 860 - COVER3
  • [28] A Novel Bidirectional RFID Identity Authentication Protocol
    Xie, Songyou
    Liang, Wei
    Xu, Jianbo
    Tang, Mingdong
    Weng, Tien-Hsiung
    Li, Kuan-Ching
    2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, : 301 - 307
  • [29] Improving an Identity Authentication Management Protocol in IIoT
    AlAbdullatif, Asayel
    AlAjaji, Kholood
    Al-Serhani, Norah Saad
    Zagrouba, Rachid
    AlDossary, Maryam
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [30] An Improved Lightweight Identity Authentication Protocol for VANET
    Wang, Peng
    Liu, Yining
    Lv, Songzhan
    JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (05): : 1491 - 1504