Improved Secure Anonymous Identity-based Key Agreement Protocol for Distributed Computer Networks
نویسندگان
چکیده
In 2011, Cui and Cao proposed a secure anonymous key agreement for distributed networks, in which user collect other users’ identity of his own group to utilize them in communication and attacker can’t determine the real identity of user. However, the drawback of calculation consumption exists in the above protocol. In the paper, we adopt Elliptic Curve Cryptography (ECC) to reduce the computational cost happened in Cui and Cao’s protocol, and propose the indexing trick to speed up the search of legal user. Our proposed scheme maintains the characteristic of obfuscating user identity to thwart identification attempts.
منابع مشابه
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملA novel key management scheme for heterogeneous sensor networks based on the position of nodes
Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...
متن کاملSecurity Proof for the Improved Ryu-Yoon-Yoo Identity-Based Key Agreement Protocol
Key agreement protocols are essential for secure communications in open and distributed environments. The protocol design is, however, extremely error-prone as evidenced by the iterative process of fixing discovered attacks on published protocols. We revisit an efficient identity-based (ID-based) key agreement protocol due to Ryu, Yoon and Yoo. The protocol is highly efficient and suitable for ...
متن کاملCryptanalysis and Improvement of an Improved Two Factor Authentication Scheme for Telecare Medicine Information Systems
Telecare medical information systems (TMIS) aim to provide healthcare services remotely. Efficient and secure mechanism for authentication and key agreement is required in order to guarantee the security and privacy of patients in TMIS. Recently Amin et al. proposed an improved RSA based user authentication and session key agreement protocol for TMIS after demonstrating some security pitfalls i...
متن کاملAn Improved Anonymous Authentication Scheme for Roaming Services
In wireless network and mobile network, a two-factor authentication scheme for roaming services enables a mobile user to achieve mutual authentication and key agreement with the foreign agent. In this paper, we review Kim et al.’s anonymous authentication scheme in global mobility networks. Analysis shows that Kim et al.’s scheme fails to achieve anonymity and two-factor authentication. In addi...
متن کامل