Skip to main content
Erschienen in: The Journal of Supercomputing 2/2013

01.11.2013

Two ID-based authenticated schemes with key agreement for mobile environments

verfasst von: Chih-Ho Chou, Kuo-Yu Tsai, Chung-Fu Lu

Erschienen in: The Journal of Supercomputing | Ausgabe 2/2013

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the rapid development of electronic commerce transactions on mobile devices, achieving secure communications between communication parties is an important issue. The typical solutions are authenticated key agreement protocols, designed to efficiently implement secure channels for two or more parties communicating via a public network by providing them with a shared secret key, called a session key. In this paper, we propose two key agreement schemes based on elliptic curve cryptosystems suited for mobile environments. The first one is an identity-based remote mutual authentication with key agreement scheme, and it is used to establish a session key between the client and the server. In the second one, we extend the proposed two-party authentication key exchange scheme to develop an efficient three-party authenticated key agreement scheme for establishing a session key between two users with the help of a trusted server. Both our proposed schemes achieve efficiency, practicability, simplicity, and strong notions of security.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Blake-Wilson S, Johnson D, Menezes A (1997) Key agreement protocols and their security analysis. In: Proc of the sixth IMA international conference on cryptography and coding, pp 30–45 Blake-Wilson S, Johnson D, Menezes A (1997) Key agreement protocols and their security analysis. In: Proc of the sixth IMA international conference on cryptography and coding, pp 30–45
2.
Zurück zum Zitat Borisov N, Goldberg I, Wagner D (2001) Intercepting mobile communications: the insecurity of 802.11. In: Proc of the 7th international conference on mobile computing and networking, pp 180–189. doi:10.1145/381677.381695 Borisov N, Goldberg I, Wagner D (2001) Intercepting mobile communications: the insecurity of 802.11. In: Proc of the 7th international conference on mobile computing and networking, pp 180–189. doi:10.​1145/​381677.​381695
3.
Zurück zum Zitat Canetti R, Krawczyk H (2001) Analysis of key-exchange protocols and their use for building secure channels. In: Proc of advances in cryptology—EUROCRYPT 2001, Innsbruck, Austria, pp 453–474. doi:10.1007/3-540-44987-6_28 CrossRef Canetti R, Krawczyk H (2001) Analysis of key-exchange protocols and their use for building secure channels. In: Proc of advances in cryptology—EUROCRYPT 2001, Innsbruck, Austria, pp 453–474. doi:10.​1007/​3-540-44987-6_​28 CrossRef
10.
Zurück zum Zitat Islam SH, Biswas GP (2011) A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J Syst Softw 84(11):1892–1898. doi:10.1016/j.jss.2011.06.061 CrossRef Islam SH, Biswas GP (2011) A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J Syst Softw 84(11):1892–1898. doi:10.​1016/​j.​jss.​2011.​06.​061 CrossRef
13.
Zurück zum Zitat Lee CC, Chang YF (2008) On security of a practical three-party key exchange protocol with round efficiency. Inf Technol Control 37(4):333–335 MathSciNet Lee CC, Chang YF (2008) On security of a practical three-party key exchange protocol with round efficiency. Inf Technol Control 37(4):333–335 MathSciNet
16.
Zurück zum Zitat Miller VS (1986) Use of elliptic curves in cryptography. In: Proc of advances in cryptology—CRYPTO, vol 85, pp 417–426 CrossRef Miller VS (1986) Use of elliptic curves in cryptography. In: Proc of advances in cryptology—CRYPTO, vol 85, pp 417–426 CrossRef
17.
Zurück zum Zitat Padmavathy R (2010) Improved three party EKE protocol. Inf Technol Control 39(3):220–226 Padmavathy R (2010) Improved three party EKE protocol. Inf Technol Control 39(3):220–226
19.
Zurück zum Zitat Tseng YM (2007) An efficient two-party identity-based key exchange protocol. Informatica 18:125–136 MATH Tseng YM (2007) An efficient two-party identity-based key exchange protocol. Informatica 18:125–136 MATH
22.
Zurück zum Zitat Yoon E, Choi S, Yoo K (2012) A secure and efficiency ID-based authenticated key agreement scheme based on elliptic curve cryptosystem for mobile devices. Int J Innov Comput Inf Control 8(4):2637–2653 Yoon E, Choi S, Yoo K (2012) A secure and efficiency ID-based authenticated key agreement scheme based on elliptic curve cryptosystem for mobile devices. Int J Innov Comput Inf Control 8(4):2637–2653
24.
Zurück zum Zitat Yoon E, Yoo K (2009) Robust ID-based remote mutual authentication with key agreement protocol for mobile devices on ECC. In: Proc of 2009 international conference on computational science and engineering, pp 633–640. doi:10.1109/CSE.2009.363 CrossRef Yoon E, Yoo K (2009) Robust ID-based remote mutual authentication with key agreement protocol for mobile devices on ECC. In: Proc of 2009 international conference on computational science and engineering, pp 633–640. doi:10.​1109/​CSE.​2009.​363 CrossRef
Metadaten
Titel
Two ID-based authenticated schemes with key agreement for mobile environments
verfasst von
Chih-Ho Chou
Kuo-Yu Tsai
Chung-Fu Lu
Publikationsdatum
01.11.2013
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 2/2013
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-013-0962-3

Weitere Artikel der Ausgabe 2/2013

The Journal of Supercomputing 2/2013 Zur Ausgabe

Premium Partner