DocumentCode
175291
Title
High-Efficient Multi-key Exchange Protocol Based on Three-Party Authentication
Author
Kun-Lin Tsai ; Yi-Li Huang ; Fang-Yie Leu ; Jiu-Soon Tan ; Mengyuan Ye
Author_Institution
Dept. of Electr. Eng., Tunghai Univ., Tunghai, Taiwan
fYear
2014
fDate
2-4 July 2014
Firstpage
487
Lastpage
492
Abstract
Three-party authenticated key exchange protocol is designed for securing the communication between two users with the help of a trusted server. The users can encrypt data with the exchanged secret keys and then transmit the cipher text to each other. However, the inefficiency, unreliability, and inflexibility problems that can be found in many previous studies should be solved. Therefore, in this paper, we propose a secure multiple key exchange scheme, named the High-efficient Multi-key Exchange protocol based on Three-party Authentication (HeM3A for short), which provides users with a secure method to exchange their encryption keys by utilizing the elliptic curve cryptographic method, the logical XOR operation and the binary addition. The propose is hiding important parameters so as to avoid them from being cracked by hackers easily, and resist known-key, impersonation, replay and eavesdropping attacks. The multi-key exchange process, which provides higher security and performance than previous protocols, is practically useful in securing mobile applications.
Keywords
computer crime; cryptographic protocols; mobile computing; mobile radio; private key cryptography; public key cryptography; telecommunication security; trusted computing; HeM3A; binary addition; ciphertext transmission; data encryption; eavesdropping attack; elliptic curve cryptographic method; encryption key exchange; hacker prevention; high-efficient multikey exchange protocol; impersonation attack; logical XOR operation; mobile application security; multiple key exchange scheme security; replay attack; secret key exchange; three-party authenticated key exchange protocol; trusted server; Authentication; Elliptic curve cryptography; Mobile communication; Protocols; Servers; binary addition; elliptic curve cryptosystem; key exchange; parameter hiding; three-party authentication;
fLanguage
English
Publisher
ieee
Conference_Titel
Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2014 Eighth International Conference on
Conference_Location
Birmingham
Print_ISBN
978-1-4799-4333-3
Type
conf
DOI
10.1109/IMIS.2014.70
Filename
6975512
Link To Document