A privacy-preserving certificateless two-party authenticated key exchange protocol without bilinear pairing for mobile-commerce applications

被引:1
|
作者
Ogundoyin, Sunday Oyinlola [1 ]
机构
[1] Department of Electrical and Electronic Engineering, University of Ibadan, Ibadan, Nigeria
来源
关键词
Public key cryptography - Geometry;
D O I
10.1080/23742917.2019.1595357
中图分类号
学科分类号
摘要
In recent times, several three-party authenticated key exchange (3PAKE) and two-party authenticated key exchange (2PAKE) protocols have been proposed to establish secret session key for confidentiality of transactions among clients in mobile commerce (m-commerce) environments. However, the involvement of a trusted server (TS) in every communication as well as the numerous communication rounds and many message exchanges in 3PAKE make them unsuitable for m-commerce applications. In this work, we propose an efficient and privacy-preserving 2PAKE protocol based on certificateless public key cryptography using elliptic curve cryptography with only one communication round and one message exchange between two clients. The protocol is provably secure, autonomous and provides conditional, location and identity privacies. The performance analysis shows that the proposed protocol has better efficiency than the existing related protocols in terms of computation cost and communication overheads. © 2019, © 2019 Informa UK Limited, trading as Taylor & Francis Group.
引用
收藏
页码:137 / 162
相关论文
共 50 条
  • [41] Quantum Privacy-preserving Two-party Circle Intersection Protocol Based on Phase-encoded Query
    Li, Zi-Xian
    Yang, Qi
    Feng, Bao
    Liu, Wen-Jie
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2023, 62 (07)
  • [42] IDPriU: A two-party ID-private data union protocol for privacy-preserving machine learning
    Yan, Jianping
    Wei, Lifei
    Qian, Xiansong
    Zhang, Lei
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 88
  • [43] Quantum Privacy-preserving Two-party Circle Intersection Protocol Based on Phase-encoded Query
    Zi-Xian Li
    Qi Yang
    Bao Feng
    Wen-Jie Liu
    International Journal of Theoretical Physics, 62
  • [44] Secure and Efficient Two-Party Quantum Scalar Product Protocol With Application to Privacy-Preserving Matrix Multiplication
    Liu, Wen-Jie
    Li, Zi-Xian
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2023, 70 (11) : 4456 - 4469
  • [45] Cryptanalysis and improvement of an efficient two-party authentication key exchange protocol for mobile environment
    Park, KiSung
    Lee, KyungKeun
    Park, YoungHo
    2018 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2018, : 72 - 73
  • [46] One-round protocol for two-party verifier-based password-authenticated key exchange
    Kwon, Jeong Ok
    Sakurai, Kouichi
    Lee, Dong Hoon
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 87 - 96
  • [47] A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card
    Li, Xiaowei
    Zhang, Yuqing
    Liu, Xuefeng
    Cao, Jin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (05): : 1313 - 1327
  • [48] Two-Party Key Agreement Protocol Without Central Authority for Mobile Ad Hoc Networks
    Jyothi, Asha
    Narsimha, G.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2019, 13 (04) : 68 - 88
  • [49] Efficient two-party privacy-preserving collaborative k-means clustering protocol supporting both storage and computation outsourcing
    Jiang, Zoe L.
    Guo, Ning
    Jin, Yabin
    Lv, Jiazhuo
    Wu, Yulin
    Liu, Zechao
    Fang, Junbin
    Yiu, S. M.
    Wang, Xuan
    INFORMATION SCIENCES, 2020, 518 : 168 - 180
  • [50] An Efficient Three-Party Authentication and Key Agreement Protocol for Privacy-Preserving of IoT Devices in Mobile Edge Computing
    Ji, Sai
    Yuan, Yang
    Shen, Jian
    Lai, Chin-Feng
    Chen, Bofan
    JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (03): : 437 - 448