Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision

被引:21
|
作者
Abbasinezhad-Mood, Dariush [1 ]
Mazinani, Sayyed Majid [1 ]
Nikooghadam, Morteza [1 ]
Ostad-Sharif, Arezou [1 ]
机构
[1] Imam Reza Int Univ, Dept Comp Engn, Mashhad 55391735, Razavi Khorasan, Iran
关键词
Protocols; Smart cards; Authentication; Servers; Encryption; Password; Anonymity; dynamic ID-based authenticated key agreement (DIDAKA); ProVerif; random oracle; REMOTE USER AUTHENTICATION; EXCHANGE PROTOCOL; SMART-CARD; CRYPTANALYSIS;
D O I
10.1109/TDSC.2020.3024654
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Providing security and privacy in today's digital era is very crucial. In order to ensure that the sensitive user data can only be accessed by a valid server, the user and server should agree on a common key in advance. To do so, in the last decade, a number of dynamic ID-based authenticated key agreement (DIDAKA) protocols have been proposed, which can guarantee subsequent secure communications of users and servers. Nevertheless, investigating the related works indicates that the existing DIDAKA schemes suffer from one or more security challenges. Quite recently, Xie et al. have presented an interesting anonymous DIDAKA protocol to cover the security weaknesses of previous schemes; nonetheless, we found that their scheme is susceptible to three attacks. Therefore, to remedy the security limitations, in this article, we propose a security-enhanced anonymous DIDAKA protocol, which not only keeps the merits of Xie et al.'s scheme, but also offers better execution time compared to their proposed one. To demonstrate the security of the proposed scheme, we present both formal security proof and automatic formal verification of security and to show its efficiency, we present an extensive comparative performance analysis. In conclusion, the results are indicative of the priority of the proposed scheme.
引用
收藏
页码:1227 / 1238
页数:12
相关论文
共 50 条
  • [31] Tightly Secure ID-based Authenticated Key Exchange
    Mita, Takumu
    Yoneyama, Kazuki
    [J]. PROCEEDINGS OF THE 11TH ACM ASIA PUBLIC-KEY CRYPTOGRAPHY WORKSHOP, APKC 2024, 2024, : 42 - 53
  • [32] Efficient provably secure password-based explicit authenticated key agreement
    Ruan, Ou
    Kumar, Neeraj
    He, Debiao
    Lee, Jong-Hyouk
    [J]. PERVASIVE AND MOBILE COMPUTING, 2015, 24 : 50 - 60
  • [33] Efficient ID-based Two Round Authenticated Group Key Agreement Protocol
    Tang Hong
    Zhu Liehuang
    Zhang Zijian
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4924 - 4927
  • [34] Efficient ID-Based One Round Authenticated Group Key Agreement Protocol
    Shi, Yijuan
    Chen, Gongliang
    Li, Jianhua
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (03): : 167 - 170
  • [35] Efficient ID-based authenticated group key agreement from bilinear pairings
    Zhou, Lan
    Susilo, Willy
    Mu, Yi
    [J]. MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2006, 4325 : 521 - +
  • [36] Round-optimal ID-based dynamic authenticated group key agreement
    Li, Fei
    Xie, Dongqing
    Yan, Jianhua
    Gao, Wei
    Wang, Xu An
    [J]. International Journal of High Performance Systems Architecture, 2016, 6 (03) : 153 - 161
  • [37] The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version
    Zhu, ZhenChao
    Zhang, Yuqing
    Wang, Fengjiao
    [J]. PROVABLE SECURITY, 2008, 5324 : 210 - +
  • [38] Attack on an ID-based authenticated group key agreement scheme from PKC 2004
    Zhang, FG
    Chen, XF
    [J]. INFORMATION PROCESSING LETTERS, 2004, 91 (04) : 191 - 193
  • [39] A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
    Wu, Tsu-Yang
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    [J]. SCIENTIFIC WORLD JOURNAL, 2014,
  • [40] ID-based Key-insulated Authenticated Key Agreement Protocol
    周渊
    程晓明
    柴震川
    [J]. Journal of Shanghai Jiaotong University(Science), 2007, (02) : 247 - 249