An Improved Authentication Protocol Without Trusted Third Party∗

نویسندگان

  • Min-Shiang Hwang
  • Chin-Chen Chang
  • Kuo-Feng Hwang
  • Shieh-Yang-Sun’s Proto
چکیده

This letter presents a secure authentication protocol which supports both the privacy of messages and the authenticity of the communicating parties. A scheme for extending a secure authentication protocol to improve the security of the communicating parties is also proposed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Robust Authentication in Trusted Sensing Networks with Physically Uncloneable Functions

We consider the problem of secure distributed aggregation in arbitrary networked systems. In previous work, we proposed a general approach based on the principles of trusted systems theory, in which the functionality of a generic aggregation system was secured by the application of dedicated trusted devices. Here, we propose a symmetric trusted third party authentication protocol, applicable to...

متن کامل

Design Principles and Security of Authentication Protocols with Trusted Third Party

Two-way identity authentication is the basis of secure communication in a distributed application environment. A trusted third party (TTP) is needed while PKI is not applicable, and the design of authentication protocols with TTP is a complicate and challenging task. This paper examines the characteristics of the security of authentication protocols with TTP, summarizes the essential factors of...

متن کامل

A Computer Aided Design of a Secure Registration Protocol

We use the formal language LOTOS to specify a registration protocol between a user and a Trusted Third Party that requires mutual authentication We explain how a model based veri cation method can be used to verify its ro bustness to attacks by an intruder This method is also used to nd a simpler protocol that remains secure

متن کامل

Preserving User Privacy with Anonymous Authentication in Cloud Computing

Cloud computing offers its flexibility and dynamic nature in terms of its access to resources anytime and anywhere. All data and other resources in cloud storage are managed and controlled by the Cloud Service Provider. They provide security and ensure that the data is protected and free from any vulnerability. However, providing privacy through authentication mechanism is a big challenge. Most...

متن کامل

A Bilateral Authentication Protocol Based on Lightweight CA and Proof with BAN Logic for Wireless Mesh Networks

In a Wireless Mesh Network (WMN), we cannot assume the existence of a trusted certificate authority that is used in regular Public-Key Infrastructure (PKI). Hence a cooperative approach in which a cluster of some nodes can issue certificates to other nodes in a self-organizing manner is considered to be more suitable to the Ad-hoc nature of WMNs. In this paper, we propose a new trust establishm...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001