{"title":"Cryptanalysis and improvement of an efficient two-party authentication key exchange protocol for mobile environment","authors":"Kisung Park, KyungKeun Lee, Youngho Park","doi":"10.23919/ELINFOCOM.2018.8330686","DOIUrl":null,"url":null,"abstract":"A mobile user can access mobile service anywhere and at anytime through mobile environment. However, mobile environment can be vulnerable to potential adversary because mobile service is provided in public network. To overcome these security issue, in 2017, Qi et al. proposed an efficient two-party authentication key exchange protocol for mobile environment. However, we point out that Qi et al.'s scheme cannot resist insider attack, impersonation attack and trace attack. we also demonstrate that Qi et al.'s scheme cannot provide anonymity. In order to theses security weaknesses, we propose improved and efficient two-party authentication key exchange protocol for mobile environment using secure parameter.","PeriodicalId":413646,"journal":{"name":"2018 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Electronics, Information, and Communication (ICEIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/ELINFOCOM.2018.8330686","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
A mobile user can access mobile service anywhere and at anytime through mobile environment. However, mobile environment can be vulnerable to potential adversary because mobile service is provided in public network. To overcome these security issue, in 2017, Qi et al. proposed an efficient two-party authentication key exchange protocol for mobile environment. However, we point out that Qi et al.'s scheme cannot resist insider attack, impersonation attack and trace attack. we also demonstrate that Qi et al.'s scheme cannot provide anonymity. In order to theses security weaknesses, we propose improved and efficient two-party authentication key exchange protocol for mobile environment using secure parameter.