Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision

被引:21
|
作者
Abbasinezhad-Mood, Dariush [1 ]
Mazinani, Sayyed Majid [1 ]
Nikooghadam, Morteza [1 ]
Ostad-Sharif, Arezou [1 ]
机构
[1] Imam Reza Int Univ, Dept Comp Engn, Mashhad 55391735, Razavi Khorasan, Iran
关键词
Protocols; Smart cards; Authentication; Servers; Encryption; Password; Anonymity; dynamic ID-based authenticated key agreement (DIDAKA); ProVerif; random oracle; REMOTE USER AUTHENTICATION; EXCHANGE PROTOCOL; SMART-CARD; CRYPTANALYSIS;
D O I
10.1109/TDSC.2020.3024654
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Providing security and privacy in today's digital era is very crucial. In order to ensure that the sensitive user data can only be accessed by a valid server, the user and server should agree on a common key in advance. To do so, in the last decade, a number of dynamic ID-based authenticated key agreement (DIDAKA) protocols have been proposed, which can guarantee subsequent secure communications of users and servers. Nevertheless, investigating the related works indicates that the existing DIDAKA schemes suffer from one or more security challenges. Quite recently, Xie et al. have presented an interesting anonymous DIDAKA protocol to cover the security weaknesses of previous schemes; nonetheless, we found that their scheme is susceptible to three attacks. Therefore, to remedy the security limitations, in this article, we propose a security-enhanced anonymous DIDAKA protocol, which not only keeps the merits of Xie et al.'s scheme, but also offers better execution time compared to their proposed one. To demonstrate the security of the proposed scheme, we present both formal security proof and automatic formal verification of security and to show its efficiency, we present an extensive comparative performance analysis. In conclusion, the results are indicative of the priority of the proposed scheme.
引用
收藏
页码:1227 / 1238
页数:12
相关论文
共 50 条
  • [1] Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision (vol 19, pg 1227, 2022)
    Cao, Zhengjun
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 4304 - 4305
  • [2] Efficient ID-based authenticated key agreement
    Jin Lijie
    Xu Chunxiang
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 681 - 684
  • [3] A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party
    Mishra, Dheerendra
    Dharminder, Dharminder
    Yadav, Preeti
    Rao, Y. Sreenivasa
    Vijayakumar, Pandi
    Kumar, Neeraj
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55
  • [4] ID-Based Authenticated Dynamic Group Key Agreement
    王莺洁
    潘军
    诸鸿文
    [J]. Journal of Shanghai Jiaotong University(Science), 2005, (03) : 236 - 241
  • [5] Security of an efficient ID-based authenticated key agreement protocol from pairings
    Wang, SB
    Cao, ZF
    Bao, HY
    [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 342 - 349
  • [6] An Enhanced ID-based Authenticated Multiple Key Agreement Protocol
    Tan, Zuowen
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (01): : 21 - 28
  • [7] An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme
    Li, Fagen
    Yu, Yong
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 547 - 551
  • [8] An efficient ID-Based authenticated key agreement protocol with pairings
    Oh, Jai-Boo
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, PROCEEDINGS, 2007, 4742 : 446 - 456
  • [9] A Dynamic ID-based Authenticated Group Key Agreement Protocol
    Zheng, Jun
    Yang, Cheng
    Xue, Jinrong
    Zhang, Can
    [J]. PROCEEDINGS OF THE 2015 4TH NATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING ( NCEECE 2015), 2016, 47 : 1079 - 1084
  • [10] Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model
    Xie, Qi
    Wong, Duncan S.
    Wang, Guilin
    Tan, Xiao
    Chen, Kefei
    Fang, Liming
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (06) : 1382 - 1392