Improved Secure Anonymous Identity-based Key Agreement Protocol for Distributed Computer Networks

نویسندگان

  • Wen-Chung Kuo
  • Kai Chain
  • Jiin-Chiou Cheng
چکیده

In 2011, Cui and Cao proposed a secure anonymous key agreement for distributed networks, in which user collect other users’ identity of his own group to utilize them in communication and attacker can’t determine the real identity of user. However, the drawback of calculation consumption exists in the above protocol. In the paper, we adopt Elliptic Curve Cryptography (ECC) to reduce the computational cost happened in Cui and Cao’s protocol, and propose the indexing trick to speed up the search of legal user. Our proposed scheme maintains the characteristic of obfuscating user identity to thwart identification attempts.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

متن کامل

Security Proof for the Improved Ryu-Yoon-Yoo Identity-Based Key Agreement Protocol

Key agreement protocols are essential for secure communications in open and distributed environments. The protocol design is, however, extremely error-prone as evidenced by the iterative process of fixing discovered attacks on published protocols. We revisit an efficient identity-based (ID-based) key agreement protocol due to Ryu, Yoon and Yoo. The protocol is highly efficient and suitable for ...

متن کامل

Cryptanalysis and Improvement of an Improved Two Factor Authentication Scheme for Telecare Medicine Information Systems

Telecare medical information systems (TMIS) aim to provide healthcare services remotely. Efficient and secure mechanism for authentication and key agreement is required in order to guarantee the security and privacy of patients in TMIS. Recently Amin et al. proposed an improved RSA based user authentication and session key agreement protocol for TMIS after demonstrating some security pitfalls i...

متن کامل

An Improved Anonymous Authentication Scheme for Roaming Services

In wireless network and mobile network, a two-factor authentication scheme for roaming services enables a mobile user to achieve mutual authentication and key agreement with the foreign agent. In this paper, we review Kim et al.’s anonymous authentication scheme in global mobility networks. Analysis shows that Kim et al.’s scheme fails to achieve anonymity and two-factor authentication. In addi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012