An elliptic curve based authenticated key agreement protocol for wireless security

被引:0
|
作者
Shin, SeongHan [1 ]
Kobara, Kazukuni [1 ]
Imai, Hideki [1 ]
机构
[1] Natl Inst Adve Ind Sci & Technol AIST, Res Ctr Informat Security, Chiyoda Ku, Tokyo 1010021, Japan
来源
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
When we consider wireless security, it is strongly preferable to use password-based authentication and the elliptic curve based Diffie-Hellman protocol since the former provides a user-friendly authentication method and the latter is an efficient key agreement protocol. However, this combination does riot necessarily guarantee security against off-line dictionary attacks (especially, "partition attacks"). In this paper, we propose an elliptic curve based authenticated key agreement (called EC-AKA) protocol that is secure against partition attacks as well as suitable for the following situation: (1) a client, who communicates with many different servers, remembers only one password and has insecure devices; (2) the counterpart servers are riot perfectly secure against several attacks; (3) neither PKI (Public Key Infrastructures) nor TRM (Tamper Resistance Modules) is available. The EC-AKA protocol is secure under the elliptic curve Diffie-Hellman problem in the random oracle model. We also show that; the EC-AKA protocol achieves more strengthened security properties and efficiency compared with the existing protocols (employed in the IEEE 802.1x).
引用
收藏
页码:767 / 777
页数:11
相关论文
共 50 条
  • [1] Elliptic curve based authenticated key agreement protocol for wireless security
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1096 - 1100
  • [2] An efficient elliptic curve cryptography based authenticated key agreement protocol for wireless LAN security
    Azim, MA
    Jamalipour, A
    [J]. 2005 WORKSHOP ON HIGH PERFORMANCE SWITCHING AND ROUTING, 2005, : 376 - 380
  • [3] Exploration of Schemes for Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptosystem
    Nimbhorkar, S. U.
    Malik, L. G.
    [J]. 2013 SIXTH INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING AND TECHNOLOGY (ICETET 2013), 2013, : 134 - 135
  • [4] An anonymous SIP authenticated key agreement protocol based on elliptic curve cryptography
    Lu, Yanrong
    Zhao, Dawei
    [J]. MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2022, 19 (01) : 66 - 85
  • [5] An Authenticated Constant Round Group Key Agreement Protocol Based on Elliptic Curve Cryptography
    Zhu Liehuang
    Liao Lejian
    Li Wenzhuo
    Zhang Zijian
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (8B): : 131 - 134
  • [6] AN EFFICIENT AND SECURE THREE-PASS AUTHENTICATED KEY AGREEMENT ELLIPTIC CURVE BASED PROTOCOL
    Mohammad, Zeyad
    Hsu, Chien-Lung
    Chen, Yaw-Chung
    Lo, Chi-Chun
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (03): : 1273 - 1284
  • [7] A Novel Authenticated Group Key Agreement Protocol Based on Elliptic Curve Diffie-Hellman
    Tang Hong
    Zhu Liehuang
    Zhang Zijian
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4611 - 4614
  • [8] On the Security of Certificateless Authenticated Key Agreement Protocol
    Hou Meng-bo
    Xu Qiu-liang
    [J]. 2009 IEEE INTERNATIONAL SYMPOSIUM ON IT IN MEDICINE & EDUCATION, VOLS 1 AND 2, PROCEEDINGS, 2009, : 974 - 979
  • [9] A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications
    Abi-Char, Pierre E.
    Mhamed, Abdallah
    El-Hassan, Bachar
    [J]. NGMAST 2007: 2007 INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES, 2007, : 235 - +
  • [10] An improved authentication key agreement protocol based on elliptic curve for wireless mobile networks
    Chang, Chin-Chen
    Chang, Shih-Chang
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1375 - 1378