Two ID-based authenticated schemes with key agreement for mobile environments

被引:0
作者
Chih-Ho Chou
Kuo-Yu Tsai
Chung-Fu Lu
机构
[1] National Taiwan University of Science and Technology,Department of Information Management
[2] Hwa Hsia Institute of Technology,Department of Management Information Systems
[3] Chihlee Institute of Technology,Department of Information Management
来源
The Journal of Supercomputing | 2013年 / 66卷
关键词
Key agreement; Elliptic curve cryptosystem; Mobile environment; Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
With the rapid development of electronic commerce transactions on mobile devices, achieving secure communications between communication parties is an important issue. The typical solutions are authenticated key agreement protocols, designed to efficiently implement secure channels for two or more parties communicating via a public network by providing them with a shared secret key, called a session key. In this paper, we propose two key agreement schemes based on elliptic curve cryptosystems suited for mobile environments. The first one is an identity-based remote mutual authentication with key agreement scheme, and it is used to establish a session key between the client and the server. In the second one, we extend the proposed two-party authentication key exchange scheme to develop an efficient three-party authenticated key agreement scheme for establishing a session key between two users with the help of a trusted server. Both our proposed schemes achieve efficiency, practicability, simplicity, and strong notions of security.
引用
收藏
页码:973 / 988
页数:15
相关论文
共 38 条
[1]  
Chen TH(2008)A round-and computation-efficient three-party authenticated key exchange protocol J Syst Softw 81 1581-1590
[2]  
Lee WB(1976)New directions in cryptography IEEE Trans Inf Theory IT-22(6) 644-654
[3]  
Chen HB(2008)Cryptanalysis of simple three party key exchange protocol Comput Secur 27 16-21
[4]  
Diffie W(2011)An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security Inf Fusion 13 223-230
[5]  
Hellman M(2010)Two proposed identity-based three-party authenticated key agreement protocols from pairings Comput Secur 29 244-252
[6]  
Guo H(2011)A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem J Syst Softw 84 1892-1898
[7]  
Li Z(2001)An unknown key-share attack on the MQV key agreement protocol ACM Trans Inf Syst Secur 4 275-288
[8]  
Mu Y(1987)Elliptic curve cryptosystem Math Comput 48 203-209
[9]  
Zhang X(2008)On security of a practical three-party key exchange protocol with round efficiency Inf Technol Control 37 333-335
[10]  
He D(2005)Efficient verifier-based key agreement protocol for three parties without server’s public key Appl Math Comput 167 996-1003