sHMQV: An Efficient Key Exchange Protocol for Power-Limited Devices

被引:1
|
作者
Zhao, Shijun [1 ]
Zhang, Qianying [1 ]
机构
[1] Chinese Acad Sci, Inst Software, ISCAS, Beijing, Peoples R China
关键词
Authenticated Key Exchange; CK model; Security Analysis; Power-limited Devices; SECURITY ANALYSIS; HELLMAN;
D O I
10.1007/978-3-319-17533-1_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we focus on designing authenticated key exchange protocols for practical scenarios where the party consists of a powerful but untrusted host (e.g., PC, mobile phone, etc) and a power-limited but trusted device (e.g., Trusted Platform Module, Mobile Trusted Module, Smart Card, etc). HMQV and (s,r) OAKE1 protocols are the state-of-the-art in the integrity of security and efficiency. However, we find that they are not suitable for the above scenarios as all (or part) of the online exponentiation computations must be performed in the power-limited trusted devices, which makes them inefficient for the deployment in practice. To overcome the above inefficiency, we propose a variant of HMQV protocol, denoted sHMQV, under some new design rationales which bring the following advantages: 1) eliminating the validation of the ephemeral public keys, which costs one exponentiation; 2) the power-limited trusted device only performs one exponentiation, which can be pre-computed offline; 3) all the online exponentiation computations can be performed in the powerful host. The above advantages make sHMQV enjoy better performance than HMQV and (s, r) OAKE, especially when deployed in the scenarios considered in this paper. We finally formally prove the security of sHMQV in the CK model.
引用
收藏
页码:154 / 167
页数:14
相关论文
共 50 条
  • [1] Energy-Efficient Scheduling and Resource Allocation for Power-limited Cognitive IoT Devices
    Wang, Kang
    Wu, Peiran
    Xia, Minghua
    [J]. 2023 19TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, WIMOB, 2023, : 104 - 109
  • [2] Power-limited design
    Nikolic, Borivoje
    [J]. 2007 14TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, VOLS 1-4, 2007, : 927 - 930
  • [3] AN EFFICIENT PROTOCOL FOR PROVIDING INTEGRATED VOICE DATA SERVICES TO MOBILES OVER POWER-LIMITED SATELLITE CHANNELS
    BOSE, SK
    [J]. INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS, 1991, 9 (01): : 1 - 10
  • [4] Bandwidth scaling for efficient inference over a power-limited MAC
    Marano, Stefano
    Matta, Vincenzo
    Tong, Lang
    Willett, Peter
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL III, PTS 1-3, PROCEEDINGS, 2007, : 597 - +
  • [5] Security versus Reliability Study for Power-limited Mobile IoT Devices
    Ghourab, Esraa M.
    Azab, Mohamed
    Rizk, Mohamed
    Mokhtar, Amr
    [J]. 2017 8TH IEEE ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2017, : 430 - 437
  • [6] An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
    Zhu, RW
    Yang, GM
    Wong, DS
    [J]. INTERNET AND NETWORK ECONOMICS, PROCEEDINGS, 2005, 3828 : 500 - 509
  • [7] An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
    Zhu, Robert W.
    Yang, Guomin
    Wong, Duncan S.
    [J]. THEORETICAL COMPUTER SCIENCE, 2007, 378 (02) : 198 - 207
  • [8] An efficient authentication and key-exchange protocol for low power clients
    Dabholkar, A
    Yow, KC
    [J]. Mobile and Wireless Communications Networks, 2003, : 270 - 273
  • [9] Sizing a Power-Limited Steering System
    Williams, Daniel E.
    Sherwin, Kenneth A.
    [J]. SAE INTERNATIONAL JOURNAL OF COMMERCIAL VEHICLES, 2009, 2 (02) : 101 - 106
  • [10] Design in the power-limited scaling regime
    Nikolic, Borivoje
    [J]. IEEE TRANSACTIONS ON ELECTRON DEVICES, 2008, 55 (01) : 71 - 83