{"title":"一种高效的移动环境双方认证密钥交换协议的密码分析与改进","authors":"Kisung Park, KyungKeun Lee, Youngho Park","doi":"10.23919/ELINFOCOM.2018.8330686","DOIUrl":null,"url":null,"abstract":"A mobile user can access mobile service anywhere and at anytime through mobile environment. However, mobile environment can be vulnerable to potential adversary because mobile service is provided in public network. To overcome these security issue, in 2017, Qi et al. proposed an efficient two-party authentication key exchange protocol for mobile environment. However, we point out that Qi et al.'s scheme cannot resist insider attack, impersonation attack and trace attack. we also demonstrate that Qi et al.'s scheme cannot provide anonymity. In order to theses security weaknesses, we propose improved and efficient two-party authentication key exchange protocol for mobile environment using secure parameter.","PeriodicalId":413646,"journal":{"name":"2018 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Cryptanalysis and improvement of an efficient two-party authentication key exchange protocol for mobile environment\",\"authors\":\"Kisung Park, KyungKeun Lee, Youngho Park\",\"doi\":\"10.23919/ELINFOCOM.2018.8330686\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A mobile user can access mobile service anywhere and at anytime through mobile environment. However, mobile environment can be vulnerable to potential adversary because mobile service is provided in public network. To overcome these security issue, in 2017, Qi et al. proposed an efficient two-party authentication key exchange protocol for mobile environment. However, we point out that Qi et al.'s scheme cannot resist insider attack, impersonation attack and trace attack. we also demonstrate that Qi et al.'s scheme cannot provide anonymity. In order to theses security weaknesses, we propose improved and efficient two-party authentication key exchange protocol for mobile environment using secure parameter.\",\"PeriodicalId\":413646,\"journal\":{\"name\":\"2018 International Conference on Electronics, Information, and Communication (ICEIC)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Electronics, Information, and Communication (ICEIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/ELINFOCOM.2018.8330686\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Electronics, Information, and Communication (ICEIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/ELINFOCOM.2018.8330686","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cryptanalysis and improvement of an efficient two-party authentication key exchange protocol for mobile environment
A mobile user can access mobile service anywhere and at anytime through mobile environment. However, mobile environment can be vulnerable to potential adversary because mobile service is provided in public network. To overcome these security issue, in 2017, Qi et al. proposed an efficient two-party authentication key exchange protocol for mobile environment. However, we point out that Qi et al.'s scheme cannot resist insider attack, impersonation attack and trace attack. we also demonstrate that Qi et al.'s scheme cannot provide anonymity. In order to theses security weaknesses, we propose improved and efficient two-party authentication key exchange protocol for mobile environment using secure parameter.