Provably secure authenticated key exchange protocols for low power computing clients

被引:20
|
作者
Wen, HA
Lin, CL
Hwang, T [1 ]
机构
[1] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan, Taiwan
[2] Leader Univ, Dept Comp Sci & Informat Engn, Tainan, Taiwan
[3] Shu Te Univ, Dept Comp Sci & Informat Engn, Kaohsiung, Taiwan
关键词
cryptography; authenticated key exchange; low power computing; random oracle model;
D O I
10.1016/j.cose.2005.09.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Low power computing devices such as cellular phones, PDAs, and smart cards are very popular and widely used by people nowadays. To secure communications between a client and a server through a low power computing device, several AKE-LPC (Authenticated Key Exchange - for Low Power Computing clients) protocols have been proposed recently. This paper proposes a new efficient AKE-LPC protocol, which requires the client to perform only one hash operation during the execution phase. An augmented protocol which can additionally provide explicit mutual authentication is also presented. Furthermore, the security of the proposed protocols is formally proven in the random oracle model. (c) 2005 Elsevier Ltd. All rights reserved.
引用
收藏
页码:106 / 113
页数:8
相关论文
共 50 条
  • [1] A Provably Secure Authenticated Key Exchange Protocol
    Zhang, Lijiang
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 292 - 297
  • [2] Provably secure threshold password-authenticated key exchange
    Di Raimondo, Mario
    Gennaro, Rosario
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2006, 72 (06) : 978 - 1001
  • [3] A Provably Secure Anonymous Two-Factor Authenticated Key Exchange Protocol for Cloud Computing
    Wei, Fushan
    Zhang, Ruijie
    Ma, Chuangui
    FUNDAMENTA INFORMATICAE, 2018, 157 (1-2) : 201 - 220
  • [4] Provably secure anonymous authenticated key agreement protocols with enhanced security models
    Xie, Qi
    Tan, Xiao
    Hu, Bin
    Wang, Guilin
    Wong, Duncan S.
    Chen, Kefei
    Yu, XiuYuan
    SCIENCE, 2018, 360 (6387) : 27 - 28
  • [5] Provably secure three-party authenticated quantum key distribution protocols
    Hwang, Tzonelih
    Lee, Kuo-Chang
    Li, Chuan-Ming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (01) : 71 - 80
  • [6] Provably secure authenticated key exchange protocol under the CDH assumption
    Zhao, Jianjie
    Gu, Dawu
    JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (11) : 2297 - 2304
  • [7] Provably secure authenticated group Diffie-Hellman key exchange
    Bresson, Emmanuel
    Chevassut, Olivier
    Pointcheval, David
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2007, 10 (03)
  • [8] Simple and Provably Secure Anonymous Authenticated Key Exchange with a Binding Property
    Son, Kyungho
    Han, Dong-Guk
    Won, Dongho
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2015, E98B (01) : 160 - 170
  • [9] A secure authenticated and key exchange scheme for fog computing
    Chen, Chien-Ming
    Huang, Yanyu
    Wang, King-Hang
    Kumari, Saru
    Wu, Mu-En
    ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (09) : 1200 - 1215
  • [10] An efficient and provably secure authenticated key agreement scheme for mobile edge computing
    Rakeei, Mohammadamin
    Moazami, Farokhlagha
    WIRELESS NETWORKS, 2022, 28 (07) : 2983 - 2999