An Improved Authentication Protocol Without Trusted Third Party∗
نویسندگان
چکیده
This letter presents a secure authentication protocol which supports both the privacy of messages and the authenticity of the communicating parties. A scheme for extending a secure authentication protocol to improve the security of the communicating parties is also proposed.
منابع مشابه
Robust Authentication in Trusted Sensing Networks with Physically Uncloneable Functions
We consider the problem of secure distributed aggregation in arbitrary networked systems. In previous work, we proposed a general approach based on the principles of trusted systems theory, in which the functionality of a generic aggregation system was secured by the application of dedicated trusted devices. Here, we propose a symmetric trusted third party authentication protocol, applicable to...
متن کاملDesign Principles and Security of Authentication Protocols with Trusted Third Party
Two-way identity authentication is the basis of secure communication in a distributed application environment. A trusted third party (TTP) is needed while PKI is not applicable, and the design of authentication protocols with TTP is a complicate and challenging task. This paper examines the characteristics of the security of authentication protocols with TTP, summarizes the essential factors of...
متن کاملA Computer Aided Design of a Secure Registration Protocol
We use the formal language LOTOS to specify a registration protocol between a user and a Trusted Third Party that requires mutual authentication We explain how a model based veri cation method can be used to verify its ro bustness to attacks by an intruder This method is also used to nd a simpler protocol that remains secure
متن کاملPreserving User Privacy with Anonymous Authentication in Cloud Computing
Cloud computing offers its flexibility and dynamic nature in terms of its access to resources anytime and anywhere. All data and other resources in cloud storage are managed and controlled by the Cloud Service Provider. They provide security and ensure that the data is protected and free from any vulnerability. However, providing privacy through authentication mechanism is a big challenge. Most...
متن کاملA Bilateral Authentication Protocol Based on Lightweight CA and Proof with BAN Logic for Wireless Mesh Networks
In a Wireless Mesh Network (WMN), we cannot assume the existence of a trusted certificate authority that is used in regular Public-Key Infrastructure (PKI). Hence a cooperative approach in which a cluster of some nodes can issue certificates to other nodes in a self-organizing manner is considered to be more suitable to the Ad-hoc nature of WMNs. In this paper, we propose a new trust establishm...
متن کامل