期刊文献+

Password-Authenticated Multiple Key Exchange Protocol for Mobile Applications 被引量:2

Password-Authenticated Multiple Key Exchange Protocol for Mobile Applications
下载PDF
导出
摘要 To achieve privacy and authentication sinmltaneously in mobile applications, various Three-party Password-authenticated key exchange (3PAKE) protocols have been proposed. However, some of these protocols are vulnerable to conventional attacks or have low efficiency so that they cannot be applied to mobile applications. In this paper, we proposed a password-authenticated multiple key exchange protocol for mobile applications using elliptic curve cryptosystem. The proposed protocol can achieve efficiency, reliability, flexibility and scalability at the same time. Compared with related works, the proposed protocol is more suitable and practical for mobile applications. To achieve privacy and authentication simultaneously in mobile applications, various Three-party Password-authenticated key exchange (3PAKE) protocols have been proposed. However, some of these protocols are vulnerable to conventional attacks or have low efficiency so that they cannot be applied to mobile applications. In this paper, we proposed a password-authenticated multiple key exchange protocol for mobile applications using elliptic curve cryptosystem. The proposed protocol can achieve efficiency, reliability, flexibility and scalability at the same time. Compared with related works, the proposed protocol is more suitable and practical for mobile applications.
出处 《China Communications》 SCIE CSCD 2012年第1期64-72,共9页 中国通信(英文版)
基金 Acknowledgements This work was supported by the National Natural ScienceFoundation of China under Grants No. 60873191, No. 60903152, No. 60821001, and the Beijing Natural Science Foundation under Grant No. 4072020.
关键词 mobile applications key exchange PASSWORD elliptic curve cryptosystem SECURITY 密钥交换协议 移动应用 密码验证 椭圆曲线密码体制 身份验证 口令认证 时间效率 可扩展性
  • 相关文献

参考文献20

  • 1KAARANEN H, AHTIAINEN A, IAITINEN L,et al. UMTS Networks-Architecture, Mobility and Services [M].England:John Wiley Sons, 200!.
  • 2IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Broadband Wireless Access Sys?terrs [S]. IEEE Std. 802.16-2009 (Revision of IEEE Std. 802. 16-2004),2009, C!.
  • 3Draft STANDARD for Information Technology-Telecormrru?nications and Information Exchange Between Systerrs-Lo?cal and Metropolitan Area Networks-Specific Require?ments-Part II: Wireless IAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Amend?ment : Enhancements for Higher Throughput[S]. IEEE Draft Std. P802.lln/D2.00, February 2007.
  • 4SHIEH S, HO F, HUANG Y. An Efficient Authentication Protocol for Mobile Networks [J]. Journal of Information Science and Engineering, 1999, 15: 505-520.
  • 5HWANG R, SU F. A new Efficient Authentication Protocol for Mobile Networks [J]. Computer Standards & Interfaces, 2005,28(2): 241-252.
  • 6LIN C, SUN H, HW ANG T. Three-party Encrypted Key Ex?change: Attacks and A Solution[J]. Operating Systems Re?view, 2000, 34(4): 12-20.
  • 7YEH H, SUN H, HWANG T. Efficient Three-Party Authenti?cation and Key Agreement Protocols Resistant to Pass?word Guessing Attacks [J]. Journal of Information Science and Engineering, 2003,19(6): 1059-1070.
  • 8SUN H, CHEN B, HWANG T. Secure Key Agreement Pro?tocols for Three-Party Against Guessing Attacks [J]. Jour?nal of Systems and Software, 2005, 75(1-2): 63-68.
  • 9CHEN T, LEE W, CHEN H. A Round- and Computation-Ef?ficient Three-Party Authenticated Key Exchange Protocol [J]. Journal of Systems and Software, 2008, 81 (9): 1581-1590.
  • 10YANG J, CHANG C. An Efficient Three-Party Authentica?ted Key Exchange Protocol Using Elliptic Curve Cryptog?raphy for Mobile-Commerce Environments [J]. Journal of Systems and Software, 2009,82(9): 1497-1502.

同被引文献13

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部