A Three-Party Dynamic Identity-Based Authenticated Key Exchange Protocol with Forward Anonymity

被引:0
|
作者
Hongfeng Zhu
Shuai Geng
机构
[1] Shenyang Normal University,Software College
来源
关键词
Dynamic identity; Forward security; Forward anonymous; Authentication; Key exchange;
D O I
暂无
中图分类号
学科分类号
摘要
The three-party (two clients and one server) authenticated key exchange protocols use a pre-shared password to authenticate each other, and then by the help of server to make the two clients compute a novel session key. At present, the situation of this application is very different from those considered in the conventional literatures, and the biggest two differences are that most of the former literatures cannot guarantee the user anonymity and forward anonymity. Therefore, we propose a new three-party key exchange protocol based on dynamic identity authentication with forward anonymity, so that if the server’s long-term key is compromised, user anonymity cannot be broken or the identities of the users cannot be traced, and both sides of the communication with the help of the authentication server can be mutual authentication and the establishment of a session key. Compared with the three-party key exchange protocols, our protocol is more effective in computing cost and communication cost for more suitable towards resource-constrained environment.
引用
收藏
页码:1911 / 1924
页数:13
相关论文
共 50 条
  • [1] A Three-Party Dynamic Identity-Based Authenticated Key Exchange Protocol with Forward Anonymity
    Zhu, Hongfeng
    Geng, Shuai
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 109 (03) : 1911 - 1924
  • [2] New identity-based three-party authenticated key agreement protocol with provable security
    Xiong, Hu
    Chen, Zhong
    Li, Fagen
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (02) : 927 - 932
  • [3] An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure
    Shafiq, Akasha
    Ayub, Muhammad Faizan
    Mahmood, Khalid
    Sadiq, Mazhar
    Kumari, Saru
    Chen, Chien-Ming
    JOURNAL OF SENSORS, 2020, 2020
  • [4] A Secure Identity-Based Three-Party Authenticated Key Agreement Protocol Using Bilinear Pairings
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 : 1 - 11
  • [5] A PRACTICAL THREE-PARTY AUTHENTICATED KEY EXCHANGE PROTOCOL
    Lo, Nai Wei
    Yeh, Kuo-Hui
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (06): : 2469 - 2483
  • [6] Three-party password authenticated key agreement protocol with user anonymity based on lattice
    Wang C.
    Chen L.
    2018, Editorial Board of Journal on Communications (39): : 17 - 26
  • [7] Simple three-party password authenticated key exchange protocol
    Lo N.-W.
    Yeh K.-H.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (5) : 600 - 603
  • [8] Simple Three-Party Password Authenticated Key Exchange Protocol
    罗乃维
    叶国晖
    JournalofShanghaiJiaotongUniversity(Science), 2011, 16 (05) : 600 - 603
  • [9] A new secure three-party authenticated key exchange protocol
    Xi'an Communications Institute, Xi'an 710106, Shannxi, China
    Int. Rev. Comput. Softw., 7 (3633-3638):
  • [10] A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps
    Li, Chun-Ta
    Chen, Chin-Ling
    Lee, Cheng-Chi
    Weng, Chi-Yao
    Chen, Chien-Ming
    SOFT COMPUTING, 2018, 22 (08) : 2495 - 2506