An Authentication Protocol For Mobile Agents Using Bilinear Pairings

نویسندگان

  • Amitabh Saxena
  • Ben Soh
چکیده

A mobile agent is a mobile program capable of maintaining its execution states as it migrates between different execution platforms. A key security problem in the mobile agent paradigm is that of trust: How to ensure that the past itinerary (of execution platforms) claimed by the agent is correct. This is necessary in order to establish a reasonable level of trust for the agent before granting execution privileges. In this paper we describe a protocol using bilinear pairings that enables trust relationships to be formed between agent platforms in an ad-hoc manner without actively involving any trusted third party. This protocol can be used to authenticate agents before granting execution privileges. The main idea behind our approach is the concept of ‘one-way’ chaining. Our scheme has chosen ciphertext security assuming the hardness of the Bilinear Diffie Hellman Problem (BDHP).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Secure Mutual Authentication Scheme with Smart Cards Using Bilinear Pairings

Mutual authentication is an important security property for providing secure remote communication in client-server environment. Up to now, various remote user authentication schemes with smart card using bilinear pairings were proposed by different researchers. Unfortunately, most previously proposed authentication schemes do not provide mutual authentication and session key agreement. This pap...

متن کامل

An Efficient Deniable Authentication Protocol from Pairings to Protect Users’ Privacy

Deniable authentication is a new cryptographic technique of authentication, by which it allows the sender to prove his legitimacy to the intended receiver, but the intended receiver cannot prove to the third party the identity of the sender. Meanwhile, in order to meet various circumstances of the resource limit mobile devices, Lu and Cao proposed a non-interactive deniable authentication proto...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

Group Oriented Identity-based Deniable Authentication Protocol from the Bilinear Pairings

Deniable authentication protocol is different from traditional authentication protocol in that the intended receiver can authenticate the source of a given message, but cannot prove the source to a third party. In recent years, many deniable authentication protocols have been put forth. To adapt to some special group communication requirements, in this paper, we will propose a new group oriente...

متن کامل

A Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards

With rapid growth of mobile wireless networks, handheld devices are popularly used by people and many mobile applications have been rapidly developed. Considering the limited computing capability of smart cards or mobile devices, the security scheme design suitable for these mobile devices is a nontrivial challenge. A user authentication scheme is a mechanism to authenticate a remote user over ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2005  شماره 

صفحات  -

تاریخ انتشار 2005