Two ID-based authenticated schemes with key agreement for mobile environments

被引:0
|
作者
Chih-Ho Chou
Kuo-Yu Tsai
Chung-Fu Lu
机构
[1] National Taiwan University of Science and Technology,Department of Information Management
[2] Hwa Hsia Institute of Technology,Department of Management Information Systems
[3] Chihlee Institute of Technology,Department of Information Management
来源
The Journal of Supercomputing | 2013年 / 66卷
关键词
Key agreement; Elliptic curve cryptosystem; Mobile environment; Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
With the rapid development of electronic commerce transactions on mobile devices, achieving secure communications between communication parties is an important issue. The typical solutions are authenticated key agreement protocols, designed to efficiently implement secure channels for two or more parties communicating via a public network by providing them with a shared secret key, called a session key. In this paper, we propose two key agreement schemes based on elliptic curve cryptosystems suited for mobile environments. The first one is an identity-based remote mutual authentication with key agreement scheme, and it is used to establish a session key between the client and the server. In the second one, we extend the proposed two-party authentication key exchange scheme to develop an efficient three-party authenticated key agreement scheme for establishing a session key between two users with the help of a trusted server. Both our proposed schemes achieve efficiency, practicability, simplicity, and strong notions of security.
引用
收藏
页码:973 / 988
页数:15
相关论文
共 50 条
  • [1] Two ID-based authenticated schemes with key agreement for mobile environments
    Chou, Chih-Ho
    Tsai, Kuo-Yu
    Lu, Chung-Fu
    JOURNAL OF SUPERCOMPUTING, 2013, 66 (02): : 973 - 988
  • [2] Efficient ID-based authenticated key agreement
    Jin Lijie
    Xu Chunxiang
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 681 - 684
  • [3] Strongly secure ID-based authenticated key agreement protocol for mobile multi-server environments
    Tseng, Yuh-Min
    Huang, Sen-Shan
    You, Meng-Lin
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (11)
  • [4] ID-based authenticated key agreement for low-power mobile devices
    Choi, KY
    Hwang, JY
    Lee, DH
    Seo, IS
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2005, 3574 : 494 - 505
  • [5] ID-Based Authenticated Dynamic Group Key Agreement
    王莺洁
    潘军
    诸鸿文
    Journal of Shanghai Jiaotong University, 2005, (03) : 236 - 241
  • [6] Efficient ID-based Two Round Authenticated Group Key Agreement Protocol
    Tang Hong
    Zhu Liehuang
    Zhang Zijian
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4924 - 4927
  • [7] ID-based Key-insulated Authenticated Key Agreement Protocol
    周渊
    程晓明
    柴震川
    JournalofShanghaiJiaotongUniversity, 2007, (02) : 247 - 249
  • [8] An Enhanced ID-based Authenticated Multiple Key Agreement Protocol
    Tan, Zuowen
    INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (01): : 21 - 28
  • [9] An efficient ID-Based authenticated key agreement protocol with pairings
    Oh, Jai-Boo
    Yoon, Eun-Jun
    Yoo, Kee-Young
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, PROCEEDINGS, 2007, 4742 : 446 - 456
  • [10] A Dynamic ID-based Authenticated Group Key Agreement Protocol
    Zheng, Jun
    Yang, Cheng
    Xue, Jinrong
    Zhang, Can
    PROCEEDINGS OF THE 2015 4TH NATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING ( NCEECE 2015), 2016, 47 : 1079 - 1084