Provably secure authenticated key exchange protocols for low power computing clients

被引:20
|
作者
Wen, HA
Lin, CL
Hwang, T [1 ]
机构
[1] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan, Taiwan
[2] Leader Univ, Dept Comp Sci & Informat Engn, Tainan, Taiwan
[3] Shu Te Univ, Dept Comp Sci & Informat Engn, Kaohsiung, Taiwan
关键词
cryptography; authenticated key exchange; low power computing; random oracle model;
D O I
10.1016/j.cose.2005.09.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Low power computing devices such as cellular phones, PDAs, and smart cards are very popular and widely used by people nowadays. To secure communications between a client and a server through a low power computing device, several AKE-LPC (Authenticated Key Exchange - for Low Power Computing clients) protocols have been proposed recently. This paper proposes a new efficient AKE-LPC protocol, which requires the client to perform only one hash operation during the execution phase. An augmented protocol which can additionally provide explicit mutual authentication is also presented. Furthermore, the security of the proposed protocols is formally proven in the random oracle model. (c) 2005 Elsevier Ltd. All rights reserved.
引用
收藏
页码:106 / 113
页数:8
相关论文
共 50 条
  • [11] An efficient and provably secure authenticated key agreement scheme for mobile edge computing
    Mohammadamin Rakeei
    Farokhlagha Moazami
    Wireless Networks, 2022, 28 : 2983 - 2999
  • [12] Efficient and Secure Authenticated Key Exchange Protocols in the eCK Model
    Lee, Jooyoung
    Park, Je Hong
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 129 - 138
  • [13] Authenticated Key Exchange Protocols Based on Provable Secure Attribute
    Xia, Hui
    Liu, Jie
    FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY V, 2015, : 1421 - 1425
  • [14] Authenticated Key Exchange Provably Secure Against the Man-in-the-Middle Attack
    Anna M. Johnston
    Peter S. Gemmell
    Journal of Cryptology, 2002, 15 : 139 - 148
  • [15] Provably secure threshold password-authenticated key exchange extended abstract
    Di Raimondo, M
    Gennaro, R
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 507 - 523
  • [16] Authenticated key exchange provably secure against the man-in-the-middle attack
    Johnston, AM
    Gemmell, PS
    JOURNAL OF CRYPTOLOGY, 2002, 15 (02) : 139 - 148
  • [17] Provably secure three-party password-authenticated key exchange
    Lin, CL
    Wen, HA
    Hwang, T
    Sun, HM
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (11) : 2990 - 3000
  • [18] Efficient and provably secure generic construction of three-party password-based authenticated key exchange protocols
    Wang, Weijia
    Hu, Lei
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 118 - +
  • [19] Provably secure identity-based authenticated key agreement protocols with malicious private key generators
    Guo, Hua
    Li, Zhoujun
    Mu, Yi
    Zhang, Xiyong
    INFORMATION SCIENCES, 2011, 181 (03) : 628 - 647
  • [20] Provably secure authenticated key agreement scheme for distributed mobile cloud computing services
    Odelu, Vanga
    Das, Ashok Kumar
    Kumari, Saru
    Huang, Xinyi
    Wazid, Mohammad
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 68 : 74 - 88