{"title":"Identity-based authenticated key exchange protocols","authors":"Liang Xiaoyong, Zhang Hui","doi":"10.1109/ICEIT.2010.5608417","DOIUrl":null,"url":null,"abstract":"with the rapid development on electronic technology, various mobile devices are produced to make human life more convenient. With the mobile devices are portable, people can do some traditional transactions on Internet or wireless anytime and anywhere. How to make the communications security in such devices is none trivial thing than one might at first glance since some current authenticated key exchange can not suitable to be applied to mobile device Due to the computational ability and storage capacity is limited, in this paper, we propose an identity-based authenticated key exchange protocol without using bilinear pairings or Weil pairing. Compared with previous ID-based protocols, our protocols can minimize computational overload and storage space without extra message exchange time. In addition, our protocol can resist to key compromise impersonation resilience, KGS forward secrecy, no key control attacks and so on. We believe our proposed protocol can be well applied to low-power devices.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Educational and Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEIT.2010.5608417","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
with the rapid development on electronic technology, various mobile devices are produced to make human life more convenient. With the mobile devices are portable, people can do some traditional transactions on Internet or wireless anytime and anywhere. How to make the communications security in such devices is none trivial thing than one might at first glance since some current authenticated key exchange can not suitable to be applied to mobile device Due to the computational ability and storage capacity is limited, in this paper, we propose an identity-based authenticated key exchange protocol without using bilinear pairings or Weil pairing. Compared with previous ID-based protocols, our protocols can minimize computational overload and storage space without extra message exchange time. In addition, our protocol can resist to key compromise impersonation resilience, KGS forward secrecy, no key control attacks and so on. We believe our proposed protocol can be well applied to low-power devices.