An Identity Authentication Protocol in Online Social Networks

被引:0
|
作者
Li, Lingjun [1 ]
Zhao, Xinxin [1 ]
Xue, Guoliang [1 ]
机构
[1] Arizona State Univ, Tempe, AZ 85287 USA
来源
7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012) | 2012年
基金
美国国家科学基金会;
关键词
authentication; online social networks; key exchange; SECURITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent success of online social networks (OSNs) motivates the study of security issues in OSNs. A fundamental but challenging security issue in OSNs is to authenticate a friend's real identity. A solution to this issue will benefit a number of OSN security protocols. Existing solutions require users to securely obtain some secret information from their friends before authentication takes place, which is not always possible in OSNs. In this paper, we propose a new authenticated key exchange protocol based on the exclusive secrets shared between friends. It provides identity authentication and key exchange in a plain setting, i.e., users do not need to securely exchange or distribute any information beforehand. The protocol is designed to work with low-entropy input information, because human beings are not good at dealing with a large amount of information. Another advantage of our protocol is its tolerance of input errors considering human error is always a possibility. We prove the security of the protocol in the universal composability (UC) framework and demonstrate its efficiency.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] An online identity authentication method for blood smear
    Feng, Xiaozhen
    Cao, Yiping
    Peng, Kuang
    Chen, Cheng
    JOURNAL OF INNOVATIVE OPTICAL HEALTH SCIENCES, 2016, 9 (06)
  • [32] DDoS attack resisting authentication protocol for mobile based online social network applications
    Bhattacharya, Munmun
    Roy, Sandip
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Banerjee, Soumya
    Mitra, Ankush
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 65
  • [33] An efficient authentication protocol for mobile networks
    Shieh, SP
    Ho, FS
    Huang, YL
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 1999, 15 (04) : 505 - 520
  • [34] An Authentication Protocol for Future Sensor Networks
    Bilal, Muhammad
    Kang, Shin-Gak
    SENSORS, 2017, 17 (05):
  • [35] An optimized authentication protocol for mobile networks
    Mahshid, Mir-Kamran
    Eslamipoor, Reza
    NEURAL COMPUTING & APPLICATIONS, 2014, 25 (02): : 379 - 385
  • [36] An optimized authentication protocol for mobile networks
    Mir-Kamran Mahshid
    Reza Eslamipoor
    Neural Computing and Applications, 2014, 25 : 379 - 385
  • [37] A new authentication protocol for GSM: Networks
    Al-Tawil, K
    Akrami, A
    Youssef, H
    23RD ANNUAL CONFERENCE ON LOCAL COMPUTER NETWORKS - PROCEEDINGS, 1998, : 21 - 30
  • [38] Authentication protocol for wireless sensor networks
    Gupta, Sunil
    Verma, Harsh Kumar
    Sangal, Al
    World Academy of Science, Engineering and Technology, 2010, 66 : 643 - 649
  • [39] Group Authentication Protocol for Mobile Networks
    Aboudagga, Nidal
    Quisquater, Jean-Jacques
    Eltoweissy, Mohamed
    THIRD IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS - WIMOB 2007, 2007,
  • [40] Authentication protocol for wireless sensor networks
    Gupta, Sunil
    Verma, Harsh Kumar
    Sangal, A.L.
    World Academy of Science, Engineering and Technology, 2010, 42 : 630 - 636