On the design of provably secure identity-based authentication and key exchange protocol for heterogeneous wireless access

被引:0
|
作者
Jiang, J [1 ]
He, C [1 ]
Jiang, LG [1 ]
机构
[1] Shanghai Jiao Tong Univ, Inst Modern Commun, Shanghai 200030, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Heavily based on the provable security model of Canetti and Krawczyk (CK-model), an identity-based authentication and key exchange (AKE) protocol which uses pairings is proposed for securing heterogeneous wireless access in this paper. By using the CK-model approach, an ideal and secure key exchange protocol was first proposed. Then a full-fledged authenticator is built to provide authentication of the ideal protocol. This completes a practical AKE protocol for heterogeneous environment while carrying the security proof. Analysis shows that our protocol is secure with partial forward secrecy, and efficient for considering the asymmetric wireless environment.
引用
收藏
页码:972 / 981
页数:10
相关论文
共 50 条
  • [1] Provably Secure Identity-based Group Key Exchange Protocol
    SangJae Moon
    [J]. China Communications, 2007, 4 (04) : 11 - 22
  • [2] Provably Secure Identity-based Group Key Exchange Protocol
    Cao Chunjie
    Ma Jianfeng
    SangJae Moon
    [J]. CHINA COMMUNICATIONS, 2007, 4 (04) : 11 - 22
  • [3] A Provably Secure Identity-based Authentication Multiple Key Agreement Protocol
    Tan Zuowen
    [J]. CHINA COMMUNICATIONS, 2011, 8 (02) : 26 - 33
  • [4] An Improved Provably Secure Identity-Based Authenticated Key Agreement Protocol
    Li, Yang
    Zhu, Jianming
    Zhang, Wei
    Yang, Xin
    [J]. 2014 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT (ICMECG), 2014, : 98 - 103
  • [5] Provably secure and pairing-free identity-based handover authentication protocol for wireless mobile networks
    Islam, S. K. Hafizul
    Khan, Muhammad Khurram
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (17) : 2442 - 2456
  • [6] A Provably Secure Identity-Based Key Agreement Protocol from Key Encapsulation Scheme
    Cai, Yang
    Xu, Qiuliang
    Zheng, Zhihua
    [J]. PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 636 - 640
  • [7] An Identity-based Access Authentication Scheme for Heterogeneous Wireless Network
    Hou Huifang
    Wang Yuhua
    Wang Yunxia
    Liu Guangqiang
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 231 - 234
  • [8] PROVABLY SECURE IDENTITY-BASED AUTHENTICATED KEY AGREEMENT PROTOCOL AND ITS APPLICATION
    Shao, Shuai
    Tian, Bin
    Wang, Xin
    Li, Yang
    [J]. 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 1240 - 1244
  • [9] RYY++: A Novel Provably Secure Identity-Based Authenticated Key Agreement Protocol
    Li Yang
    Zhu Jianming
    Zhang Ning
    Wang Xiuli
    Zhang Yaoqi
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2015, 24 (02) : 332 - 337
  • [10] RYY++: A Novel Provably Secure Identity-Based Authenticated Key Agreement Protocol
    LI Yang
    ZHU Jianming
    ZHANG Ning
    WANG Xiuli
    ZHANG Yaoqi
    [J]. Chinese Journal of Electronics, 2015, 24 (02) : 332 - 337