Authenticated encryption protocol with perfect forward secrecy for mobile communication

被引:3
|
作者
Lu, Rongxing [1 ]
Cao, Zhenfu [1 ]
Dong, Xiaolei [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China
来源
关键词
authenticated encryption; perfect forward secrecy; mobile communication; short signature; bilinear pairings;
D O I
10.1002/wcm.394
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure and authenticated message transmission is one of the major aims of mobile communication security research. To achieve this goal, a typical methodology in mobile communication is a mobile device and its server first establish a session key, then use the session key to encrypt all subsequent messages. However, establish such an authenticated session key itself is a hard work, and only use the session key to encrypt subsequent messages also cannot provide nonrepudiation. Therefore, there is a desire to seek an alternative method. In this paper, we would like to propose a new authenticated encryption protocol for mobile communication. The proposed protocol, compared with other authenticated encryption protocols, will simultaneously achieve confidentiality, integrity, authentication, nonrepudiation, and perfect forward secrecy. Copyright (c) 2006 John Wiley & Sons, Ltd.
引用
收藏
页码:273 / 280
页数:8
相关论文
共 50 条
  • [21] An improved mutual authentication protocol based on perfect forward secrecy for satellite communications
    Xu, Shuishuai
    Liu, Xindong
    Ma, Mimi
    Chen, Jianhua
    INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 2020, 38 (01) : 62 - 73
  • [22] A USIM compatible 5G AKA protocol with perfect forward secrecy
    Arkko, Jari
    Norrman, Karl
    Naslund, Mats
    Sahlin, Bengt
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1205 - 1209
  • [23] A new protocol of wide use for e-mail with perfect forward secrecy
    Chen, Tzung-her
    Wu, Yan-ting
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2010, 11 (01): : 74 - 78
  • [24] New Secure and Practical E-Mail Protocol with Perfect Forward Secrecy
    Lee, Chien-Ding
    Chen, Tzung-Her
    SYMMETRY-BASEL, 2021, 13 (07):
  • [25] A new protocol of wide use for e-mail with perfect forward secrecy
    Tzung-her Chen
    Yan-ting Wu
    Journal of Zhejiang University SCIENCE C, 2010, 11 : 74 - 78
  • [26] An enhanced authenticated key agreement protocol for wireless mobile communication
    Lu, Rongxing
    Cao, Zhenfu
    Zhu, Haojin
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (06) : 647 - 652
  • [27] Introducing Perfect Forward Secrecy for AN.ON
    Westermann, Benedikt
    Kesdogan, Dogan
    NETWORKED SERVICES AND APPLICATIONS - ENGINEERING, CONTROL AND MANAGEMENT, 2010, 6164 : 132 - 142
  • [28] Secure Communication Protocol for Network-on-Chip with Authenticated Encryption and Recovery Mechanism
    Haase, Julian
    Jaster, Sebastian
    Franz, Elke
    Goehringer, Diana
    2022 IEEE 33RD INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS (ASAP), 2022, : 156 - 160
  • [29] Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security
    Huang, Hai
    PROVABLE SECURITY, 2011, 6980 : 389 - 397
  • [30] Symmetric authentication codes with secrecy and unconditionally secure authenticated encryption
    McAven, L
    Safavi-Naini, R
    Yung, M
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS, 2004, 3348 : 148 - 161