Skip to main content
Top
Published in: The Journal of Supercomputing 2/2013

01-11-2013

Two ID-based authenticated schemes with key agreement for mobile environments

Authors: Chih-Ho Chou, Kuo-Yu Tsai, Chung-Fu Lu

Published in: The Journal of Supercomputing | Issue 2/2013

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the rapid development of electronic commerce transactions on mobile devices, achieving secure communications between communication parties is an important issue. The typical solutions are authenticated key agreement protocols, designed to efficiently implement secure channels for two or more parties communicating via a public network by providing them with a shared secret key, called a session key. In this paper, we propose two key agreement schemes based on elliptic curve cryptosystems suited for mobile environments. The first one is an identity-based remote mutual authentication with key agreement scheme, and it is used to establish a session key between the client and the server. In the second one, we extend the proposed two-party authentication key exchange scheme to develop an efficient three-party authenticated key agreement scheme for establishing a session key between two users with the help of a trusted server. Both our proposed schemes achieve efficiency, practicability, simplicity, and strong notions of security.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Blake-Wilson S, Johnson D, Menezes A (1997) Key agreement protocols and their security analysis. In: Proc of the sixth IMA international conference on cryptography and coding, pp 30–45 Blake-Wilson S, Johnson D, Menezes A (1997) Key agreement protocols and their security analysis. In: Proc of the sixth IMA international conference on cryptography and coding, pp 30–45
2.
go back to reference Borisov N, Goldberg I, Wagner D (2001) Intercepting mobile communications: the insecurity of 802.11. In: Proc of the 7th international conference on mobile computing and networking, pp 180–189. doi:10.1145/381677.381695 Borisov N, Goldberg I, Wagner D (2001) Intercepting mobile communications: the insecurity of 802.11. In: Proc of the 7th international conference on mobile computing and networking, pp 180–189. doi:10.​1145/​381677.​381695
3.
go back to reference Canetti R, Krawczyk H (2001) Analysis of key-exchange protocols and their use for building secure channels. In: Proc of advances in cryptology—EUROCRYPT 2001, Innsbruck, Austria, pp 453–474. doi:10.1007/3-540-44987-6_28 CrossRef Canetti R, Krawczyk H (2001) Analysis of key-exchange protocols and their use for building secure channels. In: Proc of advances in cryptology—EUROCRYPT 2001, Innsbruck, Austria, pp 453–474. doi:10.​1007/​3-540-44987-6_​28 CrossRef
10.
go back to reference Islam SH, Biswas GP (2011) A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J Syst Softw 84(11):1892–1898. doi:10.1016/j.jss.2011.06.061 CrossRef Islam SH, Biswas GP (2011) A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J Syst Softw 84(11):1892–1898. doi:10.​1016/​j.​jss.​2011.​06.​061 CrossRef
13.
go back to reference Lee CC, Chang YF (2008) On security of a practical three-party key exchange protocol with round efficiency. Inf Technol Control 37(4):333–335 MathSciNet Lee CC, Chang YF (2008) On security of a practical three-party key exchange protocol with round efficiency. Inf Technol Control 37(4):333–335 MathSciNet
16.
go back to reference Miller VS (1986) Use of elliptic curves in cryptography. In: Proc of advances in cryptology—CRYPTO, vol 85, pp 417–426 CrossRef Miller VS (1986) Use of elliptic curves in cryptography. In: Proc of advances in cryptology—CRYPTO, vol 85, pp 417–426 CrossRef
17.
go back to reference Padmavathy R (2010) Improved three party EKE protocol. Inf Technol Control 39(3):220–226 Padmavathy R (2010) Improved three party EKE protocol. Inf Technol Control 39(3):220–226
19.
go back to reference Tseng YM (2007) An efficient two-party identity-based key exchange protocol. Informatica 18:125–136 MATH Tseng YM (2007) An efficient two-party identity-based key exchange protocol. Informatica 18:125–136 MATH
22.
go back to reference Yoon E, Choi S, Yoo K (2012) A secure and efficiency ID-based authenticated key agreement scheme based on elliptic curve cryptosystem for mobile devices. Int J Innov Comput Inf Control 8(4):2637–2653 Yoon E, Choi S, Yoo K (2012) A secure and efficiency ID-based authenticated key agreement scheme based on elliptic curve cryptosystem for mobile devices. Int J Innov Comput Inf Control 8(4):2637–2653
24.
go back to reference Yoon E, Yoo K (2009) Robust ID-based remote mutual authentication with key agreement protocol for mobile devices on ECC. In: Proc of 2009 international conference on computational science and engineering, pp 633–640. doi:10.1109/CSE.2009.363 CrossRef Yoon E, Yoo K (2009) Robust ID-based remote mutual authentication with key agreement protocol for mobile devices on ECC. In: Proc of 2009 international conference on computational science and engineering, pp 633–640. doi:10.​1109/​CSE.​2009.​363 CrossRef
Metadata
Title
Two ID-based authenticated schemes with key agreement for mobile environments
Authors
Chih-Ho Chou
Kuo-Yu Tsai
Chung-Fu Lu
Publication date
01-11-2013
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 2/2013
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-013-0962-3

Other articles of this Issue 2/2013

The Journal of Supercomputing 2/2013 Go to the issue

Premium Partner