An elliptic curve based authenticated key agreement protocol for wireless security

被引:0
|
作者
Shin, SeongHan [1 ]
Kobara, Kazukuni [1 ]
Imai, Hideki [1 ]
机构
[1] Natl Inst Adve Ind Sci & Technol AIST, Res Ctr Informat Security, Chiyoda Ku, Tokyo 1010021, Japan
来源
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
When we consider wireless security, it is strongly preferable to use password-based authentication and the elliptic curve based Diffie-Hellman protocol since the former provides a user-friendly authentication method and the latter is an efficient key agreement protocol. However, this combination does riot necessarily guarantee security against off-line dictionary attacks (especially, "partition attacks"). In this paper, we propose an elliptic curve based authenticated key agreement (called EC-AKA) protocol that is secure against partition attacks as well as suitable for the following situation: (1) a client, who communicates with many different servers, remembers only one password and has insecure devices; (2) the counterpart servers are riot perfectly secure against several attacks; (3) neither PKI (Public Key Infrastructures) nor TRM (Tamper Resistance Modules) is available. The EC-AKA protocol is secure under the elliptic curve Diffie-Hellman problem in the random oracle model. We also show that; the EC-AKA protocol achieves more strengthened security properties and efficiency compared with the existing protocols (employed in the IEEE 802.1x).
引用
收藏
页码:767 / 777
页数:11
相关论文
共 50 条
  • [41] A Hybrid Authenticated Group Key Agreement Protocol in Wireless Sensor Networks
    Li, Yue
    Chen, Dehua
    Li, Wei
    Wang, Gaoli
    Smith, Paul
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [42] An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network
    Gao, Zhigang
    Feng, Dengguo
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 134 - 143
  • [43] A Pairing Free Identity Based Two Party Authenticated Key Agreement Protocol Using Hexadecimal Extended ASCII Elliptic Curve Cryptography
    Vivek Kumar
    Sangram Ray
    Mou Dasgupta
    Muhammad Khurram Khan
    [J]. Wireless Personal Communications, 2021, 118 : 3045 - 3061
  • [44] A secure authenticated key agreement protocol
    Popescu, C
    [J]. MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 783 - 786
  • [45] A Deniable Authenticated Key Agreement Protocol
    TIAN Haibo1
    2. Guangdong Key Laboratory of Information Security Technology
    [J]. Wuhan University Journal of Natural Sciences, 2008, (06) : 645 - 650
  • [46] An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (02) : 1801 - 1815
  • [47] An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography
    Yanrong Lu
    Lixiang Li
    Haipeng Peng
    Yixian Yang
    [J]. Multimedia Tools and Applications, 2017, 76 : 1801 - 1815
  • [48] Authenticated commutator key agreement protocol
    Ushakov A.
    [J]. Groups, Complexity, Cryptology, 2016, 8 (02) : 127 - 133
  • [49] A new authenticated key agreement protocol
    Abi-Char, Pierre E.
    Mhamed, Abdallah
    El-Hassan, Bachar
    [J]. NEW TECHNOLOGIES, MOBILITY AND SECURITY, 2007, : 629 - 629
  • [50] AN IMPROVED AUTHENTICATED KEY AGREEMENT PROTOCOL
    Wang Changji Yang Bo Wu Jianping Network Research Center Tsinghua University Beijing China
    [J]. JournalofElectronics, 2005, (05) : 485 - 489