Provably Secure Three-Party Authenticated Key Exchange Based on Certificate less Key Encapsulation Sensor Mechanism

被引:1
|
作者
Yang, Junhan [1 ,2 ]
Cao, Tianjie [1 ,3 ]
机构
[1] China Univ Min & Technol, Sch Comp, Xuzhou 221116, Jiangsu, Peoples R China
[2] Xian Univ Sci & Technol, Sch Comp, Xian 710054, Shaanxi, Peoples R China
[3] Chinese Acad Sci, Grad Sch, Lab Informat Secur, Beijing 100049, Peoples R China
关键词
CL-KEM; Forward Security; Mutual Authentication; KCI Resistance; Encapsulation Sensor Mechanism;
D O I
10.1166/sl.2013.2960
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In this paper, a novel three-party authenticated key exchange protocol is proposed based onkey encapsulation sensor mechanism. It consists of two components: an efficient 2-party CL-KEM based authentication and key exchange protocol and a 3-party MAC based key exchange protocol. Fortunately, the present protocol is probably secure in the standard model. It achieves both forward security and mutual authentication. It is also secure against key compromise impersonation attacks.
引用
收藏
页码:2141 / 2144
页数:4
相关论文
共 50 条
  • [21] Efficient and secure three-party authenticated key exchange protocol for mobile environments
    Chou, Chih-ho
    Tsai, Kuo-yu
    Wu, Tzong-chen
    Yeh, Kuo-hui
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2013, 14 (05): : 347 - 355
  • [22] A PRACTICAL THREE-PARTY AUTHENTICATED KEY EXCHANGE PROTOCOL
    Lo, Nai Wei
    Yeh, Kuo-Hui
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (06): : 2469 - 2483
  • [23] Provably Secure Password-Based Three-Party Key Exchange With Optimal Message Steps
    Chien, Hung-Yu
    Wu, Tzong-Chen
    COMPUTER JOURNAL, 2009, 52 (06): : 646 - 655
  • [24] Provably Secure Password-based Three-party Key Exchange Protocol with Computation Efficiency
    Fu, Jih-Ming
    Lin, Jeng-Ping
    Wang, Ren-Chiun
    LIFE SCIENCE JOURNAL-ACTA ZHENGZHOU UNIVERSITY OVERSEAS EDITION, 2011, 8 (04): : 394 - 401
  • [25] A three-party authenticated key exchange scheme smartcard using elliptic curve cryptosystem for secure key exchange in wireless sensor network
    Yang, Jongwon
    Seo, Changho
    Cho, Jinman
    2007 IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, VOLS 1 AND 2, 2007, : 339 - +
  • [26] Password-based authenticated key exchange in the three-party setting
    Abdalla, M.
    Fouque, P.-A.
    Pointcheval, D.
    IEE Proceedings: Information Security, 2006, 153 (01): : 27 - 39
  • [27] Password-based authenticated key exchange in the three-party setting
    Abdalla, M
    Fouque, PA
    Pointcheval, D
    PUBLIC KEY CRYPTOGRAPHY - PKC 2005, 2005, 3386 : 65 - 84
  • [28] Password Authenticated Key Exchange Based on RSA in the Three-Party Settings
    Dongna, E.
    Cheng, Qingfeng
    Ma, Chuangui
    PROVABLE SECURITY, PROCEEDINGS, 2009, 5848 : 168 - 182
  • [29] Three-party secure authenticated key agreement protocol based on identity sign
    Li, Ning
    Yeap, Tet
    Yu, Chong xiu
    IC-BNMT 2007: PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY, 2007, : 103 - 105
  • [30] Simple three-party password authenticated key exchange protocol
    Lo N.-W.
    Yeh K.-H.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (5) : 600 - 603