https://scholars.lib.ntu.edu.tw/handle/123456789/366370
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ren-Chiun Wang | en_US |
dc.contributor.author | Wen-Shenq Juang | en_US |
dc.contributor.author | CHIN-LAUNG LEI | en_US |
dc.creator | Ren-Chiun Wang;Wen-Shenq Juang;Chin-Laung Lei | - |
dc.date.accessioned | 2018-09-10T08:46:17Z | - |
dc.date.available | 2018-09-10T08:46:17Z | - |
dc.date.issued | 2011-07 | - |
dc.identifier.issn | 00220000 | - |
dc.identifier.uri | http://scholars.lib.ntu.edu.tw/handle/123456789/366370 | - |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-79952538982&doi=10.1016%2fj.jcss.2010.07.004&partnerID=40&md5=1512519bedfadad4edc3529e67ead7b9 | - |
dc.description.abstract | Many authentication and key agreement protocols were proposed for protecting communicated messages. In previous protocols, if the user s identity is transmitted in plaintext, an adversary can tap the communications and employ it to launch some attacks. In most protocols with user anonymity, they focus on satisfaction of several security requirements. From a client s point of view, those protocols are not admired since the cost of storage, computation and communication is high. In pervasive computing, a client usually uses a limited-resource device to access multiple servers. The storage and computation are very important issues especially in this kind of environments. Also, for a convenience of designing protocol, most protocols use timestamps to prevent the replay attack. As we know, the serious time synchronization problem exists in timestamp-based protocols. Finally, most protocols do not have formal proofs for the security. In this paper, we propose a secure and efficient identification and key agreement protocol with user anonymity based on the difficulty of cracking the elliptic curve Diffie-Hellman assumption. In addition, we also propose an augmented protocol for providing the explicit mutual authentication. Compared with the related protocols, the proposed protocols computation cost is lower and the key length is shorter. Therefore, our protocols are suitable even for applications in low power computing environments. Finally, we formally prove the security of the proposed protocols by employing the random oracle model. © 2010 Elsevier Inc. All rights reserved. | - |
dc.language | en | en |
dc.relation.ispartof | Journal of Computer and System Sciences | en_US |
dc.source | AH-anncc | - |
dc.subject | Anonymity; Authentication; Elliptic curve discrete logarithm problem; Key agreement; Random oracle model | - |
dc.subject.other | Authentication; Geometry; Ubiquitous computing; Anonymity; Authentication and key agreement protocols; Diffie-Hellman assumption; Elliptic curve discrete logarithm problems; Key agreement; Key agreement protocol; Random Oracle model; Security requirements; Network security | - |
dc.title | Provably Secure and Efficient Identification and Key Agreement Protocol with User Anonymity | - |
dc.type | conference paper | en |
dc.identifier.doi | 10.1016/j.jcss.2010.07.004 | - |
dc.identifier.scopus | 2-s2.0-79952538982 | - |
dc.identifier.isi | WOS:000288580800016 | - |
dc.relation.pages | 790-798 | - |
dc.relation.journalvolume | 77 | - |
dc.relation.journalissue | 4 | - |
item.openairecristype | http://purl.org/coar/resource_type/c_5794 | - |
item.openairetype | conference paper | - |
item.grantfulltext | none | - |
item.cerifentitytype | Publications | - |
item.fulltext | no fulltext | - |
crisitem.author.dept | Electrical Engineering | - |
crisitem.author.dept | Computer Science and Information Engineering | - |
crisitem.author.dept | Networking and Multimedia | - |
crisitem.author.orcid | 0000-0002-9011-5025 | - |
crisitem.author.parentorg | College of Electrical Engineering and Computer Science | - |
crisitem.author.parentorg | College of Electrical Engineering and Computer Science | - |
crisitem.author.parentorg | College of Electrical Engineering and Computer Science | - |
Appears in Collections: | 電機工程學系 |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.