Provably secure authenticated key exchange protocols for low power computing clients

被引:20
|
作者
Wen, HA
Lin, CL
Hwang, T [1 ]
机构
[1] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan, Taiwan
[2] Leader Univ, Dept Comp Sci & Informat Engn, Tainan, Taiwan
[3] Shu Te Univ, Dept Comp Sci & Informat Engn, Kaohsiung, Taiwan
关键词
cryptography; authenticated key exchange; low power computing; random oracle model;
D O I
10.1016/j.cose.2005.09.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Low power computing devices such as cellular phones, PDAs, and smart cards are very popular and widely used by people nowadays. To secure communications between a client and a server through a low power computing device, several AKE-LPC (Authenticated Key Exchange - for Low Power Computing clients) protocols have been proposed recently. This paper proposes a new efficient AKE-LPC protocol, which requires the client to perform only one hash operation during the execution phase. An augmented protocol which can additionally provide explicit mutual authentication is also presented. Furthermore, the security of the proposed protocols is formally proven in the random oracle model. (c) 2005 Elsevier Ltd. All rights reserved.
引用
收藏
页码:106 / 113
页数:8
相关论文
共 50 条
  • [41] Provably secure authenticated tree based group key agreement
    Dutta, R
    Barua, R
    Sarkar, P
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 92 - 104
  • [42] Secure and minimal protocols for authenticated key distribution
    IBM Zurich Research Lab, Ruschlikon, Switzerland
    Comput Commun, 9 (645-653):
  • [43] Provably Secure Authenticated Key Agreement Scheme for Smart Grid
    Odelu, Vanga
    Das, Ashok Kumar
    Wazid, Mohammad
    Conti, Mauro
    IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (03) : 1900 - 1910
  • [44] A provably secure authenticated key agreement protocol for wireless communications
    Guo, Hua
    Xu, Chang
    Mu, Yi
    Li, Zhoujun
    COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (03) : 563 - 572
  • [45] Secure authenticated key exchange protocol
    Kim, WH
    Kim, HS
    Lee, SW
    Yoo, KY
    COMPUTERS AND THEIR APPLICATIONS, 2003, : 5 - 8
  • [46] A Provably Secure General Construction for Key Exchange Protocols Using Smart Card and Password
    ZHANG Gefei
    FAN Dan
    ZHANG Yuqing
    LI Xiaowei
    ChineseJournalofElectronics, 2017, 26 (02) : 271 - 278
  • [47] A Provably Secure General Construction for Key Exchange Protocols Using Smart Card and Password
    Zhang Gefei
    Fan Dan
    Zhang Yuqing
    Li Xiaowei
    CHINESE JOURNAL OF ELECTRONICS, 2017, 26 (02) : 271 - 278
  • [48] PROVABLY SECURE HIGH ENTROPY THREE-PARTY AUTHENTICATED KEY EXCHANGE SCHEME FOR NETWORK ENVIRONMENTS
    Chang, Chin-Chen
    Tsai, Hao-Chuan
    Huang, Ya-Chieh
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (10): : 5619 - 5630
  • [49] Provably Secure Three-Party Password-Based Authenticated Key Exchange from RLWE
    Liu, Chao
    Zheng, Zhongxiang
    Jia, Keting
    You, Qidi
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 11879 : 56 - 72
  • [50] Provably Secure Three-Party Authenticated Key Exchange Based on Certificate less Key Encapsulation Sensor Mechanism
    Yang, Junhan
    Cao, Tianjie
    SENSOR LETTERS, 2013, 11 (11) : 2141 - 2144