An elliptic curve based authenticated key agreement protocol for wireless security

被引:0
|
作者
Shin, SeongHan [1 ]
Kobara, Kazukuni [1 ]
Imai, Hideki [1 ]
机构
[1] Natl Inst Adve Ind Sci & Technol AIST, Res Ctr Informat Security, Chiyoda Ku, Tokyo 1010021, Japan
来源
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
When we consider wireless security, it is strongly preferable to use password-based authentication and the elliptic curve based Diffie-Hellman protocol since the former provides a user-friendly authentication method and the latter is an efficient key agreement protocol. However, this combination does riot necessarily guarantee security against off-line dictionary attacks (especially, "partition attacks"). In this paper, we propose an elliptic curve based authenticated key agreement (called EC-AKA) protocol that is secure against partition attacks as well as suitable for the following situation: (1) a client, who communicates with many different servers, remembers only one password and has insecure devices; (2) the counterpart servers are riot perfectly secure against several attacks; (3) neither PKI (Public Key Infrastructures) nor TRM (Tamper Resistance Modules) is available. The EC-AKA protocol is secure under the elliptic curve Diffie-Hellman problem in the random oracle model. We also show that; the EC-AKA protocol achieves more strengthened security properties and efficiency compared with the existing protocols (employed in the IEEE 802.1x).
引用
收藏
页码:767 / 777
页数:11
相关论文
共 50 条
  • [31] Security of an efficient ID-based authenticated key agreement protocol from pairings
    Wang, SB
    Cao, ZF
    Bao, HY
    [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 342 - 349
  • [32] An authenticated group key transfer protocol using elliptic curve cryptography
    Jaiswal, Priyanka
    Tripathi, Sachin
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (04) : 857 - 864
  • [33] A digital certificate-based lightweight authenticated protocol with key agreement for wireless network
    Jia, Qingxuan
    Gao, Panpan
    Gao, Xin
    X., Wang
    B., Zhao
    B., Cui
    [J]. Journal of Computational Information Systems, 2013, 9 (10): : 3817 - 3825
  • [34] Tree and elliptic curve based efficient and secure group key agreement protocol
    Rawat, Arjun
    Deshmukh, Maroti
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55
  • [35] A secure and efficient three-pass authenticated key agreement protocol based on elliptic curves
    Lim, Meng-Hui
    Yeoh, Chee-Min
    Lee, Sanggon
    Lim, Hyotaek
    Lee, Hoonjae
    [J]. NETWORKING 2008: AD HOC AND SENSOR NETWORKS, WIRELESS NETWORKS, NEXT GENERATION INTERNET, PROCEEDINGS, 2008, 4982 : 170 - +
  • [36] Identity based authenticated group key agreement protocol
    Reddy, KC
    Nalla, D
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS, 2002, 2551 : 215 - 233
  • [37] Security weakness in an authenticated group key agreement protocol in two rounds
    Hwang, Jung Yeon
    Choi, Kyu Young
    Lee, Dong Hoon
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (15) : 3719 - 3724
  • [38] Security Enhancement of Ku-Wang Authenticated Key Agreement Protocol
    Chang, Chin-Chen
    Lee, Jung-San
    [J]. ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, : 467 - 471
  • [39] Authenticated Group Key Agreement Protocol for Unbalanced Wireless Mobile Networks
    Lu, Chung-Fu
    Wu, Tzong-Chen
    Shih, Tzay-Farn
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS (CISIS 2010), 2010, : 827 - 832
  • [40] A Hybrid Authenticated Group Key Agreement Protocol in Wireless Sensor Networks
    Li, Yue
    Chen, Dehua
    Li, Wei
    Wang, Gaoli
    Smith, Paul
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,