A Pairing Free Identity Based Two Party Authenticated Key Agreement Protocol Using Hexadecimal Extended ASCII Elliptic Curve Cryptography

被引:0
|
作者
Vivek Kumar
Sangram Ray
Mou Dasgupta
Muhammad Khurram Khan
机构
[1] National Institute of Technology Sikkim,Department of Computer Science and Engineering
[2] National Institute of Technology Raipur,Department of Computer Application
[3] King Saud University,Center of Excellence in Information Assurance, College of Computer and Information Sciences
来源
关键词
Identity based cryptosystem; Pairing free protocol; Elliptic curve cryptography (ECC); Extended ASCII code; Bin and balls authentication; Loss-tolerant authentication;
D O I
暂无
中图分类号
学科分类号
摘要
In wireless sensor network (WSN), the secure communication and exchange of confidential information between nodes is a challenging task. To eliminate the security flaws WSN adopts authenticated cryptography mechanisms. The authenticated key agreement protocol guarantees the reality of the users and negotiates the shared session key. In the past years, the two-way authentication scheme has been proved as a better approach for secure and energy efficient communication over Bin and Balls Authentication scheme, Timed Efficient Stream Loss-Tolerant Authentication scheme and so on. However, the recently established identity based protocols are associated with the flaws like inadequate security, high computation cost and latency in communication to a larger extent. The issues related to cost is raised because of the pairing and mapping functionalities in the state-of-the-art techniques. This paper proposes a pairing-free identity based two-party authenticated key agreement protocol based on hexadecimal extended ASCII Elliptic Curve Cryptography. The proposed scheme is developed in an adequate manner with the increased security strength and reduced cost. The security of this protocol is tightened by the extended ASCII code representation of the identity of the user. The performance of this protocol is compared with the Bin and Balls Authentication scheme, Loss-Tolerant Authentication scheme and recently proposed Ramachandran and Shanmugam scheme that show our scheme outperforms these three authentication schemes.
引用
下载
收藏
页码:3045 / 3061
页数:16
相关论文
共 50 条
  • [1] A Pairing Free Identity Based Two Party Authenticated Key Agreement Protocol Using Hexadecimal Extended ASCII Elliptic Curve Cryptography
    Kumar, Vivek
    Ray, Sangram
    Dasgupta, Mou
    Khan, Muhammad Khurram
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 118 (04) : 3045 - 3061
  • [2] An anonymous SIP authenticated key agreement protocol based on elliptic curve cryptography
    Lu, Yanrong
    Zhao, Dawei
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2022, 19 (01) : 66 - 85
  • [3] An Authenticated Constant Round Group Key Agreement Protocol Based on Elliptic Curve Cryptography
    Zhu Liehuang
    Liao Lejian
    Li Wenzhuo
    Zhang Zijian
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (8B): : 131 - 134
  • [4] An efficient elliptic curve cryptography based authenticated key agreement protocol for wireless LAN security
    Azim, MA
    Jamalipour, A
    2005 WORKSHOP ON HIGH PERFORMANCE SWITCHING AND ROUTING, 2005, : 376 - 380
  • [5] An Efficient Pairing-Free Certificateless Authenticated Two-Party Key Agreement Protocol Over Elliptic Curves
    Ghoreishi, Seyed-Mohsen
    Isnin, Ismail Fauzi
    Abd Razak, Shukor
    Chizari, Hassan
    PATTERN ANALYSIS, INTELLIGENT SECURITY AND THE INTERNET OF THINGS, 2015, 355 : 295 - 302
  • [6] Cryptanalysis of a Three-party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography
    Pu, Qiong
    Zhao, Xiuying
    Ding, Jianmin
    2009 INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN COMPUTER SCIENCE, ICRCCS 2009, 2009, : 7 - 10
  • [7] AN IDENTITY BASED AUTHENTICATED KEY AGREEMENT PROTOCOL ON THE TATE PAIRING
    Yoon, Suk Bong
    COMMUNICATIONS OF THE KOREAN MATHEMATICAL SOCIETY, 2005, 20 (03): : 611 - 621
  • [8] An authenticated key exchange protocol in elliptic curve cryptography
    Reddy, P. Vasudeva
    Padmavathamma, M.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (05): : 697 - 705
  • [9] An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (02) : 1801 - 1815
  • [10] An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography
    Yanrong Lu
    Lixiang Li
    Haipeng Peng
    Yixian Yang
    Multimedia Tools and Applications, 2017, 76 : 1801 - 1815