{"title":"具有不可追溯性的移动友好和高效的远程用户认证密钥协议协议","authors":"Chin-Chen Chang, Hai-Duong Le, Ching-Hsiang Chang","doi":"10.1109/AsiaJCIS.2012.14","DOIUrl":null,"url":null,"abstract":"Authentication and key agreement protocols are the essential guardians of the distributed applications. They help the servers and users establish mutual trust and create secure communication channels. In this paper, we propose an authentication and key agreement scheme that is secure and has low communication and computation costs. Besides its efficiency, the most significant feature of the scheme is to provide initiator untraceability which completely conceals the users' identities from all eavesdropping adversaries. The scheme is suitable to be used in mobile services and e-commerce applications due to its low costs on communication and computation as well as its untraceability feature.","PeriodicalId":130870,"journal":{"name":"2012 Seventh Asia Joint Conference on Information Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Mobile Friendly and Highly Efficient Remote User Authenticated Key Agreement Protocol Featuring Untraceability\",\"authors\":\"Chin-Chen Chang, Hai-Duong Le, Ching-Hsiang Chang\",\"doi\":\"10.1109/AsiaJCIS.2012.14\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Authentication and key agreement protocols are the essential guardians of the distributed applications. They help the servers and users establish mutual trust and create secure communication channels. In this paper, we propose an authentication and key agreement scheme that is secure and has low communication and computation costs. Besides its efficiency, the most significant feature of the scheme is to provide initiator untraceability which completely conceals the users' identities from all eavesdropping adversaries. The scheme is suitable to be used in mobile services and e-commerce applications due to its low costs on communication and computation as well as its untraceability feature.\",\"PeriodicalId\":130870,\"journal\":{\"name\":\"2012 Seventh Asia Joint Conference on Information Security\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-08-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Seventh Asia Joint Conference on Information Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AsiaJCIS.2012.14\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Seventh Asia Joint Conference on Information Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AsiaJCIS.2012.14","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Mobile Friendly and Highly Efficient Remote User Authenticated Key Agreement Protocol Featuring Untraceability
Authentication and key agreement protocols are the essential guardians of the distributed applications. They help the servers and users establish mutual trust and create secure communication channels. In this paper, we propose an authentication and key agreement scheme that is secure and has low communication and computation costs. Besides its efficiency, the most significant feature of the scheme is to provide initiator untraceability which completely conceals the users' identities from all eavesdropping adversaries. The scheme is suitable to be used in mobile services and e-commerce applications due to its low costs on communication and computation as well as its untraceability feature.