An improvement on a three-party authentication key exchange protocol using elliptic curve cryptography

被引:3
|
作者
Tan, Zuowen [1 ,2 ]
机构
[1] Department of Computer Science and Technology, School of Information Technology, Jiangxi University of Finance and Economics, Nanchang 330032, Jiangxi Province, China
[2] Key Lab of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350007, Fujian Province, China
关键词
Authentication; -; Geometry;
D O I
暂无
中图分类号
学科分类号
摘要
The authentication key exchange protocol enables communication participants to authenticate each other and agree on the session key over an insecure public network. Recently, a three-party authentication key exchange protocol based on Elliptic curve cryptograph is proposed. In this paper, we improve the three-party encrypted key exchange protocol by bilinear maps. The proposed three-party authentication key exchange protocol is provable secure under Computational Diffie-Hellman assumptions in the standard model. Furthermore, the novel protocol is more efficient.
引用
收藏
相关论文
共 50 条
  • [1] Cryptanalysis of a Three-party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography
    Pu, Qiong
    Zhao, Xiuying
    Ding, Jianmin
    2009 INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN COMPUTER SCIENCE, ICRCCS 2009, 2009, : 7 - 10
  • [2] A Noval and Efficient Three-Party Identity Authentication and Key Negotiation Protocol Based on Elliptic Curve Cryptography in VANETs
    Yu, Wenping
    Zhang, Rui
    Ma, Maode
    Wang, Cong
    ELECTRONICS, 2024, 13 (02)
  • [3] An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
    Yang, Jen-Ho
    Chang, Chin-Chen
    JOURNAL OF SYSTEMS AND SOFTWARE, 2009, 82 (09) : 1497 - 1502
  • [4] Improvement of a three-party key exchange protocol
    Lin, Sida
    Xie, Qi
    PROCEEDINGS OF THE 2009 SECOND PACIFIC-ASIA CONFERENCE ON WEB MINING AND WEB-BASED APPLICATION, 2009, : 145 - +
  • [5] An Id-Based Three-Party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-Commerce Environments
    He, Debiao
    Chen, Yitao
    Chen, Jianhua
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2013, 38 (08) : 2055 - 2061
  • [6] An Id-Based Three-Party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-Commerce Environments
    Debiao He
    Yitao Chen
    Jianhua Chen
    Arabian Journal for Science and Engineering, 2013, 38 : 2055 - 2061
  • [7] A Note on An Enhanced Three-Party Authentication Key Exchange Protocol
    Tan, Zuowen
    ADVANCED MEASUREMENT AND TEST, PARTS 1 AND 2, 2010, 439-440 : 1367 - 1372
  • [8] Three-Party Password Authentication and Key Exchange Protocol Based on MLWE
    Guo, Songhui
    Song, Yunfan
    Guo, Song
    Yang, Yeming
    Song, Shuaichao
    SYMMETRY-BASEL, 2023, 15 (09):
  • [9] Improved key exchange protocol for three-party based on verifier authentication
    Computer Center, Northeastern University, Shenyang 110004, China
    不详
    J. Southeast Univ. Engl. Ed., 2008, 3 (322-324):
  • [10] An Efficient Three-Party Authentication Key Exchange Protocol for Wireless Sensor Networks
    Li, Hongtu
    Hu, Liang
    Chu, Jianfeng
    Chi, Ling
    Li, Hongwei
    SENSOR LETTERS, 2013, 11 (05) : 990 - 996