An improvement on a three-party authentication key exchange protocol using elliptic curve cryptography

被引:3
|
作者
Tan, Zuowen [1 ,2 ]
机构
[1] Department of Computer Science and Technology, School of Information Technology, Jiangxi University of Finance and Economics, Nanchang 330032, Jiangxi Province, China
[2] Key Lab of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350007, Fujian Province, China
关键词
Authentication; -; Geometry;
D O I
暂无
中图分类号
学科分类号
摘要
The authentication key exchange protocol enables communication participants to authenticate each other and agree on the session key over an insecure public network. Recently, a three-party authentication key exchange protocol based on Elliptic curve cryptograph is proposed. In this paper, we improve the three-party encrypted key exchange protocol by bilinear maps. The proposed three-party authentication key exchange protocol is provable secure under Computational Diffie-Hellman assumptions in the standard model. Furthermore, the novel protocol is more efficient.
引用
收藏
相关论文
共 50 条
  • [41] An novel three-party authenticated key exchange protocol using one-time key
    Lv, Chao
    Ma, Maode
    Li, Hui
    Ma, Jianfeng
    Zhang, Yaoyu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 498 - 503
  • [42] Anonymity preserving and round effective three-party authentication key exchange protocol based on chaotic maps
    Pak, Kyongsok
    Pak, Songho
    Ho, Cholman
    Pak, Myongsuk
    Hwang, Choljin
    PLOS ONE, 2019, 14 (03):
  • [43] An Improved Three-Factor Remote User Authentication Protocol Using Elliptic Curve Cryptography
    Liu, Wan-Rong
    Li, Bin
    Ji, Zhi-Yong
    International Journal of Network Security, 2022, 24 (03) : 521 - 532
  • [44] An Improved Secure RFID Authentication Protocol Using Elliptic Curve Cryptography
    Liu, Wan-Rong
    Ji, Zhi-Yong
    Chu, Cheng-Chen
    International Journal of Network Security, 2024, 26 (01) : 106 - 115
  • [45] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Dinarvand, Negin
    Barati, Hamid
    WIRELESS NETWORKS, 2019, 25 (01) : 415 - 428
  • [46] A Mutual Authentication Protocol for IoT Devices using Elliptic Curve Cryptography
    Tewari, Aakanksha
    Gupta, B. B.
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 716 - 720
  • [47] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Negin Dinarvand
    Hamid Barati
    Wireless Networks, 2019, 25 : 415 - 428
  • [48] An Asymmetric Authentication Protocol for Mobile Devices Using Elliptic Curve Cryptography
    Ganesan, S. Prasanna
    2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 4, 2010, : 107 - 109
  • [49] A Computation-Efficient Three-Party Encrypted Key Exchange Protocol
    Lee, Cheng-Chi
    Chen, Shun-Der
    Chen, Chin-Ling
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 (03): : 573 - 579
  • [50] On a simple three-party password-based key exchange protocol'
    Lin, Ching-Ying
    Hwang, Tzonelih
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (11) : 1520 - 1532