An Novel Anonymous Authenticated and Key Exchange Protocol
نویسندگان
چکیده
Because of the growing importance in the fields of computer networks, how to keep user's privacy has drawn more and more concerns in recent years. In this paper, we first point out that the two given anonymous password-based authenticated and key exchange protocols are vulnerable to the anonymity attack. Then based on a ring signature scheme, we propose a new secure anonymous authenticated and key exchange protocol, which inherits all the good virtues of the previous protocols. Furthermore, we discuss the security attributes of our new scheme. Finally, we give an extension of our new scheme's application and make a conclusion of this paper.
منابع مشابه
Threshold Anonymous Password - Authenticated Key Exchange Protocol ?
At Indocrypt 2005, Viet et al., [22] have proposed an anonymous password-authenticated key exchange (PAKE) protocol and its threshold construction both of which are designed for client’s password-based authentication and anonymity against a passive server, who does not deviate the protocol. In this paper, we first point out that their threshold construction is completely insecure against off-li...
متن کاملA secure anonymous routing protocol with authenticated key exchange for ad hoc networks
Anonymity and authenticated key exchange should be paid much more attention in secure mobile ad hoc routing protocols, especially in privacy-vital environment. However, as far as we know, few papers on secure routing protocols have addressed both the anonymity and authenticated key exchange. Therefore, in this paper, we present a new secure anonymous routing protocol with authenticated key exch...
متن کاملAnonymous Password Based Authenticated Key Exchange with Sub-Linear Communication
In this paper we propose a new anonymous password-based authenticated key exchange protocol. The communication cost of our protocol is sub-linear ( ), O N which improves a previous one of O(N) cost, where N is the number of users in the system. We show that the session key is secure against an active adversary in the random oracle model and identity anonymity is secure against a semi-honest adv...
متن کاملA New Ring-Based SPHF and PAKE Protocol On Ideal Lattices
emph{ Smooth Projective Hash Functions } ( SPHFs ) as a specific pattern of zero knowledge proof system are fundamental tools to build many efficient cryptographic schemes and protocols. As an application of SPHFs, emph { Password - Based Authenticated Key Exchange } ( PAKE ) protocol is well-studied area in the last few years. In 2009, Katz and Vaikuntanathan described the first lattice-based ...
متن کاملA Novel Unconditionally Secure Oblivious Polynomial Evaluation Protocol
Oblivious polynomial evaluation is a protocol involving two parties, a sender whose input is a polynomial P , and a receiver whose input is a value x. At the end of the protocol, the receiver learns P (x) and nothing more about P , while the sender remains oblivious of both x and P (x). It is used as a primitive in many applications including protocols for private comparison of data, for mutual...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JNW
دوره 4 شماره
صفحات -
تاریخ انتشار 2009