Efficient provably-secure privacy-preserving signature-based key establishment protocol

被引:10
|
作者
Abbasinezhad-Mood, Dariush [1 ]
Ostad-Sharif, Arezou [1 ]
Nikooghadam, Morteza [1 ]
机构
[1] Imam Reza Univ, Dept Comp Engn & Informat Technol, Mashhad, Razavi Khorasan, Iran
关键词
Authentication; Key establishment; Privacy protection; Provable security; Signature; REMOTE USER AUTHENTICATION; SMART-CARD; SCHEME; AGREEMENT; DESIGN; CRYPTANALYSIS;
D O I
10.1016/j.adhoc.2019.102062
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Assuring the security and privacy of users in today's ever-growing digital communications is of prime significance. In a digital communication, in order to preserve the identities and confidential information of individuals, and more significantly, to prevent any unauthorized access and manipulation, the user and server need to establish a shared key. In recent years, a number of key establishment protocols have been put forward to keep the integrity, confidentiality, and anonymity of participants. Nonetheless, investigating the literature reveals the fact that the existing schemes cannot entirely assuage the desired security requirements. Therefore, in this paper, considering the computational efficiency, we propose a novel privacy-preserving signature-based key establishment protocol, which can guarantee subsequent secure communications of users and servers. To indicate that the proposed scheme can withstand the known attacks, we present a rigorous formal security proof and verification by utilization of two stateof-the-art techniques, i.e., the random oracle model and ProVerif tool. Further, to show that the proposed protocol has proper performance, we compare our scheme with several recently-published schemes. The achieved results evince that the proposed scheme has a proper level of efficiency and is the best in terms of security provision. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Efficient and identity-based signcryption with provably-secure
    Wen Y.
    Ma J.
    Moon S.
    International Journal of Digital Content Technology and its Applications, 2010, 4 (07) : 148 - 153
  • [22] A fog-based privacy-preserving approach for distributed signature-based intrusion detection
    Wang, Yu
    Meng, Weizhi
    Li, Wenjuan
    Li, Jin
    Liu, Wai-Xi
    Xiang, Yang
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 122 : 26 - 35
  • [23] A Privacy-Preserving Ranking Protocol Based on Secure Multiparty Multiplication
    Zhong, Hong
    Qian, Xiaoqiang
    Zhang, Dalei
    Luo, Yonglong
    INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING BIOMEDICAL ENGINEERING, AND INFORMATICS (SPBEI 2013), 2014, : 1040 - 1050
  • [24] An improved and provably secure privacy preserving authentication protocol for SIP
    Chaudhry, Shehzad Ashraf
    Naqvi, Husnain
    Sher, Muhammad
    Farash, Mohammad Sabzinejad
    ul Hassan, Mahmood
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) : 1 - 15
  • [25] An improved and provably secure privacy preserving authentication protocol for SIP
    Shehzad Ashraf Chaudhry
    Husnain Naqvi
    Muhammad Sher
    Mohammad Sabzinejad Farash
    Mahmood Ul Hassan
    Peer-to-Peer Networking and Applications, 2017, 10 : 1 - 15
  • [26] A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks
    Odelu, Vanga
    Zeadally, Sherali
    Das, Ashok Kumar
    Wazid, Mohammad
    He, Debiao
    TELECOMMUNICATION SYSTEMS, 2018, 69 (04) : 431 - 445
  • [27] A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks
    Vanga Odelu
    Sherali Zeadally
    Ashok Kumar Das
    Mohammad Wazid
    Debiao He
    Telecommunication Systems, 2018, 69 : 431 - 445
  • [28] An Efficient Privacy-Preserving Comparison Protocol
    Saha, Tushar Kanti
    Koshiba, Takeshi
    ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2017, 2018, 7 : 553 - 565
  • [29] A group signature based secure and privacy-preserving vehicular communication framework
    Guo, Jinhua
    Baugh, John P.
    Wang, Shengquan
    2007 MOBILE NETWORKING FOR VEHICULAR ENVIRONMENTS, 2007, : 103 - 108
  • [30] An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment
    Jia, Xiaoying
    He, Debiao
    Liu, Qin
    Choo, Kim-Kwang Raymond
    AD HOC NETWORKS, 2018, 71 : 78 - 87