Design and Logical Analysis of Authenticated Key Exchange Protocol

被引:0
|
作者
Chen, Li [1 ,2 ]
Jiang, Zhijun [2 ]
Zhu, Yuefei [1 ]
机构
[1] Informat Engn Univ, Dept Network Engn, Zhengzhou 450002, Henan, Peoples R China
[2] Henan Univ Fianance & Econ, Comp Ctr, Henan, Peoples R China
关键词
authenticated key exchange; token; mobile commerce; SVO logic; logical analysis;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In response to the low efficiency problem in the existing authenticated key exchange protocol for mobile commerce, the paper proposes an efficient authenticated key exchange protocol based on token, which can authenticate Identity of the mobile user in the foremost time, as well as the session key can be exchanged efficiently. To analyze the proposed protocol, the paper proposes an extension of the SVO logic and formally analyzes the objective and security of the protocol by using the extended SVO logic. The analysis results reveal that the protocol completes the ideal authentication goals through the definite key authentication.
引用
收藏
页码:4707 / +
页数:2
相关论文
共 50 条
  • [31] Anonymous Password Authenticated Key Exchange Protocol in the Standard Model
    Hu, Xuexian
    Zhang, Jiang
    Zhang, Zhenfeng
    Liu, Fengmei
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) : 1451 - 1474
  • [32] An Efficient Password Authenticated Key Exchange Protocol with Bilinear Parings
    Ding, Xiaofei
    Wei, Fushan
    Ma, Chuangui
    Chen, Shumin
    ADVANCES IN INFORMATION SECURITY AND ITS APPLICATION, 2009, 36 : 50 - 56
  • [33] An optimized two factor authenticated key exchange protocol in PWLANs
    Yoon, Eun-Jun
    Yoo, Kee-Young
    COMPUTATIONAL SCIENCE - ICCS 2006, PT 2, PROCEEDINGS, 2006, 3992 : 1000 - 1007
  • [34] Cryptanalysis of an identity-based authenticated key exchange protocol
    Hatri, Younes
    Otmani, Ayoub
    Guenda, Kenza
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (03)
  • [35] A PRACTICAL THREE-PARTY AUTHENTICATED KEY EXCHANGE PROTOCOL
    Lo, Nai Wei
    Yeh, Kuo-Hui
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (06): : 2469 - 2483
  • [36] Cryptanalysis and amendment of authenticated key exchange protocol for mobile devices
    Pursharthi, Komal
    Mishra, Dheerendra
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2025, 18 (03)
  • [37] An efficient dynamic authenticated key exchange protocol with selectable identities
    Guo, Hua
    Li, Zhoujun
    Mu, Yi
    Zhang, Fan
    Wu, Chuankun
    Teng, Jikai
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2011, 61 (09) : 2518 - 2527
  • [38] CMQV+: An authenticated key exchange protocol from CMQV
    Li Hui
    Wu ChuanKun
    SCIENCE CHINA-INFORMATION SCIENCES, 2012, 55 (07) : 1666 - 1674
  • [39] An Efficient ID-Based Authenticated Key Exchange Protocol
    Hu, Xuexian
    Liu, Wenfen
    Zhang, Jianhui
    2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 229 - +
  • [40] Practical password-based authenticated key exchange protocol
    Wu, Shuhua
    Zhu, Yuefei
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 523 - 533