期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
A Provably Secure Identity-based Authentication Multiple Key Agreement Protocol 被引量:2
1
作者 谭作文 《China Communications》 SCIE CSCD 2011年第2期26-33,共8页
An authentication multiple key agreement protocol allows the users to compute more than one session keys in an authentication way. In the paper,an identity-based authentication multiple key agreement protocol is propo... An authentication multiple key agreement protocol allows the users to compute more than one session keys in an authentication way. In the paper,an identity-based authentication multiple key agreement protocol is proposed. Its authentication part is proven secure against existential forgery on adaptively chosen message and ID attacks under the random oracle model upon the CDH assumptions. The session keys are proven secure in a formal CK security model under the random oracle model upon the CBDH assumptions. Compared with the previous multiple key agreement protocols,it requires less communication cost. 展开更多
关键词 authentICATION identity-based key agreement
下载PDF
Efficient Authenticated Key Agreement Protocol Using Self-Certified Public Keys from Pairings 被引量:12
2
作者 SHAOZu-hua 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期267-270,共4页
An efficient authenticated key agreement protocol is proposed, which makesuse of bilinear pairings and self-certificd public keys. Its security is based on the securityassumptions of the bilinear Diff ie-Hellman probl... An efficient authenticated key agreement protocol is proposed, which makesuse of bilinear pairings and self-certificd public keys. Its security is based on the securityassumptions of the bilinear Diff ie-Hellman problem and the computational Diffie-Hellman problem.Users can choose their private keys independently. The public keys and identities of users can beverified implicitly when the session key being generating in a logically single step. A trusted KeyGeneration Center is no longer requiredas in the ID-based authenticated key agreement protocolsCompared with existing authenticated key agreement protocols from pairings, the. new proposedprotocol is more efficient and secure. 展开更多
关键词 authenticated key agreement protocol self-certified public keys bilinearpairings
下载PDF
An Efficient Lightweight Authentication and Key Agreement Protocol for Patient Privacy 被引量:1
3
作者 Seyed Amin Hosseini Seno Mahdi Nikooghadam Rahmat Budiarto 《Computers, Materials & Continua》 SCIE EI 2021年第12期3495-3512,共18页
Tele-medical information system provides an efficient and convenient way to connect patients at home with medical personnel in clinical centers.In this system,service providers consider user authentication as a critic... Tele-medical information system provides an efficient and convenient way to connect patients at home with medical personnel in clinical centers.In this system,service providers consider user authentication as a critical requirement.To address this crucial requirement,various types of validation and key agreement protocols have been employed.The main problem with the two-way authentication of patients and medical servers is not built with thorough and comprehensive analysis that makes the protocol design yet has flaws.This paper analyzes carefully all aspects of security requirements including the perfect forward secrecy in order to develop an efficient and robust lightweight authentication and key agreement protocol.The secureness of the proposed protocol undergoes an informal analysis,whose findings show that different security features are provided,including perfect forward secrecy and a resistance to DoS attacks.Furthermore,it is simulated and formally analyzed using Scyther tool.Simulation results indicate the protocol’s robustness,both in perfect forward security and against various attacks.In addition,the proposed protocol was compared with those of other related protocols in term of time complexity and communication cost.The time complexity of the proposed protocol only involves time of performing a hash function Th,i.e.,:O(12Th).Average time required for executing the authentication is 0.006 seconds;with number of bit exchange is 704,both values are the lowest among the other protocols.The results of the comparison point to a superior performance by the proposed protocol. 展开更多
关键词 authentICATION key agreement protocol tele-medical Scyther perfect forward secrecy
下载PDF
Robust Authentication and Session Key Agreement Protocol for Satellite Communications
4
作者 Somayeh Soltani Seyed Amin Hosseini Seno +1 位作者 Juli Rejito Rahmat Budiarto 《Computers, Materials & Continua》 SCIE EI 2022年第6期5891-5910,共20页
Satellite networks are recognized as the most essential communication infrastructures in the world today,which complement land networks and provide valuable services for their users.Extensive coverage and service stab... Satellite networks are recognized as the most essential communication infrastructures in the world today,which complement land networks and provide valuable services for their users.Extensive coverage and service stability of these networks have increased their popularity.Since eavesdropping and active intrusion in satellite communications are much easier than in terrestrial networks,securing satellite communications is vital.So far,several protocols have been proposed for authentication and key exchange of satellite communications,but none of them fullymeet the security requirements.In this paper,we examine one of these protocols and identify its security vulnerabilities.Moreover,we propose a robust and secure authentication and session key agreement protocol using the elliptic curve cryptography(ECC).We show that the proposed protocol meets common security requirements and is resistant to known security attacks.Moreover,we prove that the proposed scheme satisfies the security features using the Automated Validation of Internet Security Protocols and Applications(AVISPA)formal verification tool and On-the fly Model-Checker(OFMC)and ATtack SEarcher(ATSE)model checkers.We have also proved the security of the session key exchange of our protocol using theReal orRandom(RoR)model.Finally,the comparison of our scheme with similar methods shows its superiority. 展开更多
关键词 Satellite communications authentICATION session key agreement secure communication security protocols formal verification
下载PDF
Two Modifications on IKE Protocol with Pre-shared Key Authentication 被引量:3
5
作者 刘东喜 张连华 白英彩 《Journal of Shanghai Jiaotong university(Science)》 EI 2003年第2期142-145,共4页
This paper proposed two modifications on IKE protocol with pre-shared key authentication. The first modification can improve its immunity against DDoS attack by authenticating the initiator before the responder genera... This paper proposed two modifications on IKE protocol with pre-shared key authentication. The first modification can improve its immunity against DDoS attack by authenticating the initiator before the responder generates the computation-intensive Diffie-Hellman public value. The second modification can improve its efficiency when the attack on messages occurs because it can detect the attack quickly by replacing the centralized authentication in origical IKE protocol with immediate authentication. In addition, the two modifications can be integrated into one protocol compactly. 展开更多
关键词 IKE protocol message authentication authenticated key agreement
下载PDF
Improved Key Agreement Based Kerberos Protocol for M-Health Security
6
作者 P.Thirumoorthy K.S.Bhuvaneshwari +3 位作者 C.Kamalanathan P.Sunita E.Prabhu S.Maheswaran 《Computer Systems Science & Engineering》 SCIE EI 2022年第8期577-587,共11页
The development of wireless sensor network with Internet of Things(IoT)predicts various applications in the field of healthcare and cloud computing.This can give promising results on mobile health care(M-health)and Te... The development of wireless sensor network with Internet of Things(IoT)predicts various applications in the field of healthcare and cloud computing.This can give promising results on mobile health care(M-health)and Telecare medicine information systems.M-health system on cloud Internet of Things(IoT)through wireless sensor network(WSN)becomes the rising research for the need of modern society.Sensor devices attached to the patients’body which is connected to the mobile device can ease the medical services.Security is the key connect for optimal performance of the m-health system that share the data of patients in wireless networks in order to maintain the anonymity of the patients.This paper proposed a secure transmission of M-health data in wireless networks using proposed key agreement based Kerberos protocol.The patients processed data are stored in cloud server and accessed by doctors and caregivers.The data transfer between the patients,server and the doctors are accessed with proposed protocol in order to maintain the confidentiality and integrity of authentication.The efficiency of the proposed algorithm is compared with the existing protocols.For computing 100 devices it consumes only 91milllisecond for computation. 展开更多
关键词 Health monitoring authentICATION preparation protocol KERBEROS key agreement
下载PDF
Two-party certificateless authenticated key agreement protocol with enhanced security 被引量:5
7
作者 Wu Tao Jing Xiaojun 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2019年第1期12-20,39,共10页
Two-party certificateless authenticated key agreement(CL-AKA) protocol is a hot topic in the field of wireless communication security. An improved two-party CL-AKA protocol with enhanced security is proposed,which is ... Two-party certificateless authenticated key agreement(CL-AKA) protocol is a hot topic in the field of wireless communication security. An improved two-party CL-AKA protocol with enhanced security is proposed,which is of provable security and unforgeability in the extended Canetti-Krawczyk(eCK) security model based on the hardness assumption of the computational Diffie Hellman(CDH) problem. Compared with other similar protocols, it is more efficient and can satisfy security properties such as free of the centralized management of certificate and key, free of bilinear pairings, two-party authentication, resistant to unknown key-share attack, key compromise impersonation attacks, the man-in-the-middle-attack(MIMA) of key generation center(KGC), etc. These properties make the proposed protocol have better performance and adaptability for military communication. 展开更多
关键词 CERTIFICATELESS cryptography authenticated key agreement protocol two-party authentication protocol SECURITY properties
原文传递
Authenticated Diffie-Hellman Key Agreement Protocol with Forward Secrecy
8
作者 ZHANG Chuanrong ZHANG Yuqing 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期641-644,共4页
Forward secrecy is an important security property in key agreement protocol. Based on Ham's protocol, in this paper a new authenticated Diffie-Hellman key agreement protocol with half forward secrecy is proposed. Thi... Forward secrecy is an important security property in key agreement protocol. Based on Ham's protocol, in this paper a new authenticated Diffie-Hellman key agreement protocol with half forward secrecy is proposed. This protocol is also based on a single cryptographic assumption, and is user authentication and shared key authentication. More importantly, our protocol provides forward secrecy with respect to one of the parties. For this reason, besides the advantages of Ham's protocol, in practice, our protocol can reduce the damages resulted from the disclosure of the user's secret key and it is very beneficial to today's communication with portable devices. 展开更多
关键词 cryptographic protocol authenticated Diffie-Hellman key agreement protocol forward secrecy
原文传递
Authentication in Wireless Body Area Network:Taxonomy and Open Challenges
9
作者 Abdullah M.Almuhaideb Kawther S.Alqudaihi 《Journal on Internet of Things》 2021年第4期159-182,共24页
Wearable body area network(WBAN)aids the communication between the health providers and patients by supporting health monitoring services.It assists the users to maintain their health status records by collecting the ... Wearable body area network(WBAN)aids the communication between the health providers and patients by supporting health monitoring services.It assists the users to maintain their health status records by collecting the body signals and transmitting them for further processing measurements.However,sensor data are publicly transferred through insecure network that facilitates the attacker malicious acts like performing masquerading attack,man in the middle,and snooping.Several authentication techniques were suggested to levitate the security of the communication channels to preserve the user data from exposure.Moreover,authentication schemes aid plenty of security issues related to user and data privacy,anonymity,repudiation,confidentiality,and integrity,but they lack performance efficiency.On the other hand,it is very hard to find the balance between security and efficiency in most of the authentication schemes,especially for the WBAN platform that consists of memory and processing constraint devices.Therefore,this paper surveys and discusses the latest authentication schemes types,techniques,and system features.Also,it highlights their strengths and weaknesses towards common knowingly attacks and provides a comparison between the popular scheme validation proofs and simulation tools.Thence,this paper draws a path for the new direction of the authentication technologies,the authentication schemes open issues,and the potential future evolution in this area. 展开更多
关键词 WBAN protocol authentICATION key agreement simulation TAXONOMY
下载PDF
A Mixed Mechanism Mutual Authentication Protocol for TETRA
10
作者 LI Hui YANG Yi-xian 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2005年第3期71-74,共4页
The mutual authentication between the MS and Switching and Management Infrastructure (SwMI) in the TErrestrial Trunked RAdio (TETRA) system are analysed in this paper and theoretical analysis shows that some drawb... The mutual authentication between the MS and Switching and Management Infrastructure (SwMI) in the TErrestrial Trunked RAdio (TETRA) system are analysed in this paper and theoretical analysis shows that some drawbacks exist when using the shared secrets in the Challenge-Response protocol : (1) It's difficult to store and maintain large amount of MS's authentication key in the SwMI when the network is large. (2) It's hard to support non-renouncement services when using the symmetrical cryptography. An authentication protocol for TETRA using Identity-based Public Keys for the SwMI to authenticate the MSs and an authentication protocol based on hash chain for the MSs to authenticate the SwMI are presented, which can effectively compensate the alopy-mentioned drawbacks. 展开更多
关键词 authentICATION TETRA Challenge-Response protocol identity-based Public key
原文传递
Investigations on Simultaneously Secure IBE Scheme and Security Proofs under RO and Non-RO Model
11
作者 Zhengtao JIANG Yongbin WANG +1 位作者 Yong WANG Yumin WANG 《Intelligent Information Management》 2009年第1期6-13,共8页
This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible VLR. This paper an... This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible VLR. This paper analyses ameliorative protocol and resolves the security communications problem between MS and HLR. 展开更多
关键词 3G SECURITY 3G SECURITY Structure 3G authentICATION and key agreement protocol SECURITY arith- metic
下载PDF
The Analysis and Amendment of Security System in 3G
12
作者 Min ZHAO Ling SHI 《Intelligent Information Management》 2009年第1期1-5,共5页
This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible VLR. This paper an... This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible VLR. This paper analyses ameliorative protocol and resolves the security communications problem between MS and HLR. 展开更多
关键词 3G SECURITY 3G SECURITY Structure 3G authentICATION and key agreement protocol SECURITY arith- metic
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部