An ID-Based Mutual Authentication and Key Exchange Protocol for Low-Power Mobile Devices

被引:46
作者
Wu, Tsu-Yang [1 ]
Tseng, Yuh-Min [1 ]
机构
[1] Natl Changhua Univ Educ, Dept Math, Changhua 500, Taiwan
关键词
resource-constrained; mobile device; authentication; key exchange; identity-based; bilinear pairing; AGREEMENT PROTOCOL; SIGNATURES; PAIRINGS; SCHEME;
D O I
10.1093/comjnl/bxp083
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The identity (ID)-based public-key system using bilinear pairings defined on elliptic curves offers a flexible approach to simplify the certificate management. In 2006, the IEEE P1363.3 committee has defined the ID-based public-key system with bilinear pairings as one of public-key cryptography standards. In this, an authenticated key agreement (AKA) protocol is one important issue that provides mutual authentication and key exchange between two parties. Owing to the fast growth of mobile networks, the computational cost on the client side with low-power computing devices is a critical factor in designing an AKA protocol suited for mobile networks. In this paper, we present an efficient and secure ID-based mutual authentication and key exchange protocol using bilinear pairings. Performance analysis and experimental data are given to demonstrate that our proposed protocol is well suited for a client-server environment with low-power mobile devices. In comparison with the recently proposed ID-based protocols, our protocol has the best performance on the client side.
引用
收藏
页码:1062 / 1070
页数:9
相关论文
共 40 条
  • [1] Barreto PSLM, 2005, LECT NOTES COMPUT SC, V3788, P515
  • [2] Bellare M., 1993, P 1 ACM C COMP COMM, P62
  • [3] A pairing SW implementation for smart-cards
    Bertoni, Guido M.
    Breveglieri, Luca
    Chen, Liqun
    Fragneto, Pasqualina
    Harrison, Keith A.
    Pelosi, Gerardo
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2008, 81 (07) : 1240 - 1247
  • [4] Bone J, 2001, AATCC REV, V1, P19
  • [5] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [6] Cha JC, 2003, LECT NOTES COMPUT SC, V2567, P18
  • [7] Identity-based key agreement protocols from pairings
    Chen, L.
    Cheng, Z.
    Smart, N. P.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (04) : 213 - 241
  • [8] Chen LQ, 2005, LECT NOTES COMPUT SC, V3386, P362
  • [9] CHEN M, 2003, SILICO BIOL, V3, P30
  • [10] Choi KY, 2005, LECT NOTES COMPUT SC, V3574, P494