Authenticated Key Agreement Scheme with Privacy-Protection in the Three-party Setting

نویسندگان

  • Jeng-Ping Lin
  • Jih-Ming Fu
چکیده

Going along with the rapid development of web technologies, in some applications on demands, partners or staffs may make a great quantity of web transactions or personal communications anytime and anywhere. However, the partners could be distributed over different network domains. They require a communal trusted third party to help them establish a shared session key for future communications. In addition, from the privacy or security point of view, the partners hope that their transactions patterns or movements are not recorded from any external eavesdropper. However, this privacy issue has never been addressed in previous literature. In this paper, we first propose a three-party key agreement scheme to construct a secure transaction mechanism with privacy protection. In our scheme, the major merits include: (1) prevention of some known attacks; (2) satisfaction of the perfect forward secrecy; (3) security against the session state reveal; (4) privacy protection; (5) no sensitive verifier table; and (6) low communication and computation cost.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Improved Two-party Password-Authenticated Key Agreement Protocol with Privacy Protection Based on Chaotic Maps

Since the 1990s, chaotic systems have widely used to cryptography which can be used to design kinds of secure protocols, digital signatures, hash functions and so on. Recently, Guo and Zhang proposed an chaotic public-key cryptosystem based key agreement protocol. In 2015, Lee has proved that Guo et al.’s scheme cannot resist off-line password guess attack. Then, Liu and Xue further point out t...

متن کامل

Provably Secure and Repeatable Authenticated Privacy-Protection Scheme Using Chaotic Maps with Distributed Architecture

Nowadays, the distributed password-authenticated key agreement schemes become more and more popular. Compare with the three traditional architectures (client/server, two clients/server and multi-server), the distributed architecture can solve problems of single-point of security, single-point of efficiency and single-point of failure. Moreover, it has the characteristics of scalability, flexibi...

متن کامل

A Novel Client-to-Client Password-Authenticated Key Exchange Protocol Using Chaotic Maps in The Standard Model

Until now, the overwhelming majority of password-authenticated key agreement protocols using chaotic maps are based on three architectures (client/server, two clients/server and multi-server) and four security models (heuristic security, random oracle, ideal cipher and standard model). However, with rapid changes in the modern communication environment such as wireless mesh networks and cloud s...

متن کامل

Secure Chaotic Maps-based Group Key Agreement Scheme with Privacy Preserving

Nowadays chaos theory related to cryptography has been addressed widely, so there is an intuitive connection between group key agreement and chaotic maps. Such a connector may lead to a novel way to construct authenticated and efficient group key agreement protocols. Many chaotic maps based two-party/three-party password authenticated key agreement (2PAKA/3PAKA) schemes have been proposed. Howe...

متن کامل

A Novel Biometrics-based One-Time Commitment Authenticated Key Agreement Scheme with Privacy Protection for Mobile Network

In recent years, due to the wide applications of social network and electronic business, privacy protection in the cyber world has attracted much attention. And in general, in order to solve the problems to set up a secure channel over public Internet, authenticated key agreement protocols can be adopted because it can achieve authentication of the corresponding participants and confidentiality...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 15  شماره 

صفحات  -

تاریخ انتشار 2013