Provably secure authenticated key exchange protocols for low power computing clients

被引:20
|
作者
Wen, HA
Lin, CL
Hwang, T [1 ]
机构
[1] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan, Taiwan
[2] Leader Univ, Dept Comp Sci & Informat Engn, Tainan, Taiwan
[3] Shu Te Univ, Dept Comp Sci & Informat Engn, Kaohsiung, Taiwan
关键词
cryptography; authenticated key exchange; low power computing; random oracle model;
D O I
10.1016/j.cose.2005.09.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Low power computing devices such as cellular phones, PDAs, and smart cards are very popular and widely used by people nowadays. To secure communications between a client and a server through a low power computing device, several AKE-LPC (Authenticated Key Exchange - for Low Power Computing clients) protocols have been proposed recently. This paper proposes a new efficient AKE-LPC protocol, which requires the client to perform only one hash operation during the execution phase. An augmented protocol which can additionally provide explicit mutual authentication is also presented. Furthermore, the security of the proposed protocols is formally proven in the random oracle model. (c) 2005 Elsevier Ltd. All rights reserved.
引用
收藏
页码:106 / 113
页数:8
相关论文
共 50 条
  • [21] Provably secure identity-based authenticated key agreement protocols in multiple PKG environment
    Xia S.
    Quan J.-X.
    Han W.-B.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2010, 32 (10): : 2393 - 2399
  • [22] A provably secure smart card-based authenticated group key exchange protocol
    Chang, Chin-Chen
    Le, Hai-Duong
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) : 1602 - 1607
  • [23] Provably secure post-quantum authenticated key exchange from supersingular isogenies
    Mingping Qi
    Jianhua Chen
    The Journal of Supercomputing, 2022, 78 : 12815 - 12833
  • [24] Provably Secure Quantum Resistance Efficient Password-Authenticated Key Exchange Protocol
    Yin A.-Q.
    Wang D.
    Guo Y.-B.
    Chen L.
    Tang D.
    Jisuanji Xuebao/Chinese Journal of Computers, 2022, 45 (11): : 2321 - 2336
  • [25] Provably secure post-quantum authenticated key exchange from supersingular isogenies
    Qi, Mingping
    Chen, Jianhua
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (10): : 12815 - 12833
  • [26] Provably secure N-party authenticated key exchange in the multicast DPWA setting
    Wang, Weijia
    Hu, Lei
    Li, Yong
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 93 - +
  • [27] Provably secure verifier-based password authenticated key exchange based on lattices
    Yu, Jinxia
    Lian, Huanhuan
    Zhao, Zongqu
    Tang, Yongli
    Wang, Xiaojun
    AI AND CLOUD COMPUTING, 2021, 120 : 121 - 156
  • [28] Provably secure password-authenticated key exchange using Diffie-Hellman
    Boyko, V
    MacKenzie, P
    Patel, S
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 156 - 171
  • [29] A secure password-authenticated key exchange between clients with different passwords
    Yoon, EJ
    Yoo, KY
    ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS, 2006, 3842 : 659 - 663
  • [30] Provably secure CL-KEM-based password-authenticated key exchange protocol
    Yang, Junhan
    Su, Bo
    Guo, Chaoping
    Han, Wenlin
    Xiao, Yang
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2017, 23 (02) : 113 - 122