A Three-Party Dynamic Identity-Based Authenticated Key Exchange Protocol with Forward Anonymity

被引:0
|
作者
Hongfeng Zhu
Shuai Geng
机构
[1] Shenyang Normal University,Software College
来源
Wireless Personal Communications | 2019年 / 109卷
关键词
Dynamic identity; Forward security; Forward anonymous; Authentication; Key exchange;
D O I
暂无
中图分类号
学科分类号
摘要
The three-party (two clients and one server) authenticated key exchange protocols use a pre-shared password to authenticate each other, and then by the help of server to make the two clients compute a novel session key. At present, the situation of this application is very different from those considered in the conventional literatures, and the biggest two differences are that most of the former literatures cannot guarantee the user anonymity and forward anonymity. Therefore, we propose a new three-party key exchange protocol based on dynamic identity authentication with forward anonymity, so that if the server’s long-term key is compromised, user anonymity cannot be broken or the identities of the users cannot be traced, and both sides of the communication with the help of the authentication server can be mutual authentication and the establishment of a session key. Compared with the three-party key exchange protocols, our protocol is more effective in computing cost and communication cost for more suitable towards resource-constrained environment.
引用
收藏
页码:1911 / 1924
页数:13
相关论文
共 50 条
  • [21] A Secure Three-Party Authenticated Key Exchange Protocol for Social Networks
    Sinha, Vivek Kumar
    Anand, Divya
    Alharithi, Fahd S.
    Almulihi, Ahmed H.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (03): : 6293 - 6305
  • [22] Cryptanalysis of an identity-based authenticated key exchange protocol
    Hatri, Younes
    Otmani, Ayoub
    Guenda, Kenza
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (03)
  • [23] A resilient identity-based authenticated key exchange protocol
    Elashry, Ibrahim
    Mu, Yi
    Susilo, Willy
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (13) : 2279 - 2290
  • [24] Two proposed identity-based three-party authenticated key agreement protocols from pairings
    Holbl, Marko
    Welzer, Tatjana
    Brumen, Bostjan
    COMPUTERS & SECURITY, 2010, 29 (02) : 244 - 252
  • [25] A secure and efficient three-party password-based authenticated key exchange protocol
    He, Yong-Zhong
    Cai, Ying
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 280 - +
  • [26] A Three-Party Password-based Authenticated Key Exchange Protocol for Wireless Communications
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    INFORMATION TECHNOLOGY AND CONTROL, 2015, 44 (04): : 404 - 409
  • [27] Provably secure three-party password-based authenticated key exchange protocol
    Zhao, Jianjie
    Gu, Dawu
    INFORMATION SCIENCES, 2012, 184 (01) : 310 - 323
  • [28] Cryptanalysis and Improvement of a Password-Based Authenticated Three-Party Key Exchange Protocol
    Lee, Youngsook
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 151 - 160
  • [29] Three-Party Password-Based Authenticated Key Exchange Protocol Based on Bilinear Pairings
    Wei, Fushan
    Ma, Chuangui
    Cheng, Qingfeng
    INFORMATION COMPUTING AND APPLICATIONS, 2010, 6377 : 135 - 142
  • [30] Untraceable biometric-based three-party authenticated key exchange for dynamic systems
    Ngoc-Tu Nguyen
    Chin-Chen Chang
    Peer-to-Peer Networking and Applications, 2018, 11 : 644 - 663