An Efficient and Secure Three-pass Authenticated Key Agreement Elliptic Curve Based Protocol
نویسندگان
چکیده
Key agreement protocols are a fundamental building block of cryptography to establish a common secret key over public network. We propose an efficient and secure three-pass authenticated key agreement protocol based on elliptic curve where three-pass protocols have significant advantages over two-pass in terms of security properties and applications. The three-pass protocols can prevent denial of service attacks in complex and unpredictable communication environments such as wireless networks and Internet. We show the proposed protocol can withstand a stronger adversary under eCK security model by using a trick in its block of hashing a static secret key with an ephemeral secret key. Furthermore, it can provide an assurance of the identity authentication of its partner, thus it can withstand non-repudiation attacks. Therefore, it is suitable for electronic commerce to provide non-repudiation services. By comparing the security and computational complexity of the proposed protocol with other existing protocols in our study, we show that the proposed protocol not only satisfies all security attributes but also obtains computational efficiency with a cost of 3 point multiplications.
منابع مشابه
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملA NEW PROTOCOL MODEL FOR VERIFICATION OF PAYMENT ORDER INFORMATION INTEGRITY IN ONLINE E-PAYMENT SYSTEM USING ELLIPTIC CURVE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL
Two parties that conduct a business transaction through the internet do not see each other personally nor do they exchange any document neither any money hand-to-hand currency. Electronic payment is a way by which the two parties transfer the money through the internet. Therefore integrity of payment and order information of online purchase is an important concern. With online purchase the cust...
متن کاملAn Eecient Protocol for Authenticated Key Agreement 1 2
This paper proposes a new and e cient two-pass protocol for authenticated key agreement in the asymmetric (public-key) setting. The protocol is based on Di e-Hellman key agreement and can be modi ed to work in an arbitrary nite group and, in particular, elliptic curve groups. Two modi cations of this protocol are also presented: a one-pass authenticated key agreement protocol suitable for envir...
متن کاملA Secure Key Agreement Protocol Using Elliptic Curves
In this paper we propose a secure protocol for authenticated key agreement based on Diffie-Hellman key agreement, which works in an elliptic curve group. We also present a simpler authenticated key agreement protocol than the proposed one and a multiple key agreement protocol which enables the participants to share two or more keys in one execution of the protocol. We prove that our protocols m...
متن کاملA Secure and Efficient Authentication with Key Agreement Scheme Based on Elliptic Curve Cryptosystem
Recently, Li et al. [20] proposed an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks to remedy the weaknesses of Rhee et al.’s scheme. Li et al.’s scheme not only achieves mutual authentication, but also provides the procedure for key agreement and updates of secrets for users and servers. However, we find that Li et al.’s scheme is ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010