Skip to main content
Erschienen in: Wireless Personal Communications 3/2019

17.08.2019

A Three-Party Dynamic Identity-Based Authenticated Key Exchange Protocol with Forward Anonymity

verfasst von: Hongfeng Zhu, Shuai Geng

Erschienen in: Wireless Personal Communications | Ausgabe 3/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The three-party (two clients and one server) authenticated key exchange protocols use a pre-shared password to authenticate each other, and then by the help of server to make the two clients compute a novel session key. At present, the situation of this application is very different from those considered in the conventional literatures, and the biggest two differences are that most of the former literatures cannot guarantee the user anonymity and forward anonymity. Therefore, we propose a new three-party key exchange protocol based on dynamic identity authentication with forward anonymity, so that if the server’s long-term key is compromised, user anonymity cannot be broken or the identities of the users cannot be traced, and both sides of the communication with the help of the authentication server can be mutual authentication and the establishment of a session key. Compared with the three-party key exchange protocols, our protocol is more effective in computing cost and communication cost for more suitable towards resource-constrained environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Zhao, J., & Dawu, G. (2012). Provably secure three-party password-based authenticated key exchange protocol. Information Sciences,184, 301–323.MathSciNetCrossRef Zhao, J., & Dawu, G. (2012). Provably secure three-party password-based authenticated key exchange protocol. Information Sciences,184, 301–323.MathSciNetCrossRef
2.
Zurück zum Zitat Okamoto, T. (2007). Authenticated key exchange and key encapsulation in the standard model (Vol. 4833)., Lecture notes in computer science Berlin: Springer.MATH Okamoto, T. (2007). Authenticated key exchange and key encapsulation in the standard model (Vol. 4833)., Lecture notes in computer science Berlin: Springer.MATH
3.
Zurück zum Zitat Yang, J., & Chang, C. (2009). An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers and Security,28, 138–143.CrossRef Yang, J., & Chang, C. (2009). An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers and Security,28, 138–143.CrossRef
4.
Zurück zum Zitat Abdalla, M., Catalano, D., Chevalier, C., & Pointcheval, D. (2008). Efficient two-party password-based key exchange protocols in the UC framework (Vol. 4964, pp. 335–351)., Lecture Notes in Computer Science Berlin: Springer.MATH Abdalla, M., Catalano, D., Chevalier, C., & Pointcheval, D. (2008). Efficient two-party password-based key exchange protocols in the UC framework (Vol. 4964, pp. 335–351)., Lecture Notes in Computer Science Berlin: Springer.MATH
5.
Zurück zum Zitat Byun, J., Lee, D., & Lim, J. (2008). Cryptanalysis of simple three-party key exchange protocol (S-3PAKE). Information Sciences,178(13), 2849–2856.MathSciNetCrossRef Byun, J., Lee, D., & Lim, J. (2008). Cryptanalysis of simple three-party key exchange protocol (S-3PAKE). Information Sciences,178(13), 2849–2856.MathSciNetCrossRef
6.
Zurück zum Zitat Phan, R., Yau, W., & Goi, B. (2011). A communication-efficient three-party password authenticated key exchange protocol. Information Sciences,181(1), 217–226.MathSciNetCrossRef Phan, R., Yau, W., & Goi, B. (2011). A communication-efficient three-party password authenticated key exchange protocol. Information Sciences,181(1), 217–226.MathSciNetCrossRef
7.
Zurück zum Zitat Yang, J., Seo, C., & Cho, J. (2007). A three-party authenticated key exchange scheme smartcard using elliptic curve cryptosystem for secure key exchange in wireless sensor network. In ISCE 2007 (pp. 1–6). Yang, J., Seo, C., & Cho, J. (2007). A three-party authenticated key exchange scheme smartcard using elliptic curve cryptosystem for secure key exchange in wireless sensor network. In ISCE 2007 (pp. 1–6).
8.
Zurück zum Zitat Das, M. L., Saxnan, A., & Gulati, V. P. (2004). A dynamic ID-based remote user authentication scheme. IEEE Transacation on Consumer Electronics,50(2), 629–631.CrossRef Das, M. L., Saxnan, A., & Gulati, V. P. (2004). A dynamic ID-based remote user authentication scheme. IEEE Transacation on Consumer Electronics,50(2), 629–631.CrossRef
9.
Zurück zum Zitat Hao, F. (2010). On robust key agreement based on public key authentication (Short Paper). In International conference on financial cryptography & data security (pp. 383–390). Springer. Hao, F. (2010). On robust key agreement based on public key authentication (Short Paper). In International conference on financial cryptography & data security (pp. 383–390). Springer.
10.
Zurück zum Zitat Wang, D., Ma, C., Wang, P., & Chen, Z. (2012). Robust smart card based password authentication scheme against smart card security breach. In IACR cryptology ePrint archive. Wang, D., Ma, C., Wang, P., & Chen, Z. (2012). Robust smart card based password authentication scheme against smart card security breach. In IACR cryptology ePrint archive.
11.
Zurück zum Zitat Lee, H., Nam, J., Kim, M., & Won, D. (2016). Forward anonymity-preserving secure remote authentication scheme. KSII Transactions on Internet and Information Systems,3(10), 1298–1310. Lee, H., Nam, J., Kim, M., & Won, D. (2016). Forward anonymity-preserving secure remote authentication scheme. KSII Transactions on Internet and Information Systems,3(10), 1298–1310.
12.
Zurück zum Zitat Abdalla, M., Fouque, P.-A., & Pointcheval, D. (2005). Password-based authenticated key exchange in the three-party setting (pp. 65–84)., Lecture notes in computer science Berlin: Springer.MATH Abdalla, M., Fouque, P.-A., & Pointcheval, D. (2005). Password-based authenticated key exchange in the three-party setting (pp. 65–84)., Lecture notes in computer science Berlin: Springer.MATH
13.
Zurück zum Zitat SK Hafizul Islam. (2014). Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps. Dordrecht: Springer. SK Hafizul Islam. (2014). Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps. Dordrecht: Springer.
14.
Zurück zum Zitat Yi, T., Chen, H., & Wu, D. (2013). Improved password-based key exchange protocol for three-parties. Computer Applications and Software, 30(1), 313–315. Yi, T., Chen, H., & Wu, D. (2013). Improved password-based key exchange protocol for three-parties. Computer Applications and Software, 30(1), 313–315.
15.
Zurück zum Zitat Lee, Y. (2012). A new dynamic ID-based user authentication scheme to resist smart card theft attack. Applied Mathematics & Information Sciences,6(2), 355–361.MathSciNet Lee, Y. (2012). A new dynamic ID-based user authentication scheme to resist smart card theft attack. Applied Mathematics & Information Sciences,6(2), 355–361.MathSciNet
17.
Zurück zum Zitat Jeong, I. R., Katz, J., & Lee, D. H. (2004). One-round protocols for two-party authenticated key exchange. In International conference on applied cryptography and network security (pp. 220–232). Jeong, I. R., Katz, J., & Lee, D. H. (2004). One-round protocols for two-party authenticated key exchange. In International conference on applied cryptography and network security (pp. 220–232).
19.
Zurück zum Zitat Tan, Z. W. (2010). A note on an enhanced three-party authentication key exchange protocol. Key Engineering Materials,439–440, 1367–1372.CrossRef Tan, Z. W. (2010). A note on an enhanced three-party authentication key exchange protocol. Key Engineering Materials,439–440, 1367–1372.CrossRef
21.
Zurück zum Zitat Wang, H., Zhang, H., Li, J., & Xu, C. (2013). A (3, 3) visual cryptography scheme for authentication. Journal of Shenyang Normal University (Natural Science Edition),31(101(03)), 397–400. Wang, H., Zhang, H., Li, J., & Xu, C. (2013). A (3, 3) visual cryptography scheme for authentication. Journal of Shenyang Normal University (Natural Science Edition),31(101(03)), 397–400.
Metadaten
Titel
A Three-Party Dynamic Identity-Based Authenticated Key Exchange Protocol with Forward Anonymity
verfasst von
Hongfeng Zhu
Shuai Geng
Publikationsdatum
17.08.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2019
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06659-6

Weitere Artikel der Ausgabe 3/2019

Wireless Personal Communications 3/2019 Zur Ausgabe

Neuer Inhalt