Provably secure authenticated key exchange protocols for low power computing clients

被引:20
|
作者
Wen, HA
Lin, CL
Hwang, T [1 ]
机构
[1] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan, Taiwan
[2] Leader Univ, Dept Comp Sci & Informat Engn, Tainan, Taiwan
[3] Shu Te Univ, Dept Comp Sci & Informat Engn, Kaohsiung, Taiwan
关键词
cryptography; authenticated key exchange; low power computing; random oracle model;
D O I
10.1016/j.cose.2005.09.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Low power computing devices such as cellular phones, PDAs, and smart cards are very popular and widely used by people nowadays. To secure communications between a client and a server through a low power computing device, several AKE-LPC (Authenticated Key Exchange - for Low Power Computing clients) protocols have been proposed recently. This paper proposes a new efficient AKE-LPC protocol, which requires the client to perform only one hash operation during the execution phase. An augmented protocol which can additionally provide explicit mutual authentication is also presented. Furthermore, the security of the proposed protocols is formally proven in the random oracle model. (c) 2005 Elsevier Ltd. All rights reserved.
引用
收藏
页码:106 / 113
页数:8
相关论文
共 50 条
  • [31] A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks
    Zhang, Ke
    Xu, Kai
    Wei, Fushan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [32] Provable secure attribute based authenticated key exchange protocols in the standard model
    Wei, Jiang-Hong
    Liu, Wen-Fen
    Hu, Xue-Xian
    Ruan Jian Xue Bao/Journal of Software, 2014, 25 (10): : 2397 - 2408
  • [33] Provably secure lightweight certificateless lattice-based authenticated key exchange scheme for IIoT
    Tan, Zuowen
    Jiao, Jintao
    Chen, Yanliang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (08):
  • [34] PDAKE Provably Secure PUF-Based Device Authenticated Key Exchange in Cloud Setting
    Byun, Jin Wook
    IEEE ACCESS, 2019, 7 : 181165 - 181177
  • [35] A Provably Secure Two-Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks Based on Authenticated Encryption
    Wei, Fushan
    Zhang, Ruijie
    Shen, Jian
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 849 - 855
  • [36] Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World
    Ding, Jintai
    Alsayigh, Saed
    Lancrenon, Jean
    Saraswathy, R., V
    Snook, Michael
    TOPICS IN CRYPTOLOGY - CT-RSA 2017, 2017, 10159 : 183 - 204
  • [37] Provably secure three-party password authenticated key exchange protocol in the standard model
    Yang, Jun-Han
    Cao, Tian-Jie
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (02) : 340 - 350
  • [38] A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity
    Yang, Xiaoyan
    Jiang, Han
    Hou, Mengbo
    Zheng, Zhihua
    Xu, Qiuliang
    Choo, Kim-Kwang Raymond
    NETWORK AND SYSTEM SECURITY (NSS 2018), 2018, 11058 : 111 - 124
  • [39] Provably secure three-party password-based authenticated key exchange protocol
    Zhao, Jianjie
    Gu, Dawu
    INFORMATION SCIENCES, 2012, 184 (01) : 310 - 323
  • [40] SECURE AND MINIMAL PROTOCOLS FOR AUTHENTICATED KEY DISTRIBUTION
    JANSON, P
    TSUDIK, G
    COMPUTER COMMUNICATIONS, 1995, 18 (09) : 645 - 653