• DocumentCode
    175291
  • Title

    High-Efficient Multi-key Exchange Protocol Based on Three-Party Authentication

  • Author

    Kun-Lin Tsai ; Yi-Li Huang ; Fang-Yie Leu ; Jiu-Soon Tan ; Mengyuan Ye

  • Author_Institution
    Dept. of Electr. Eng., Tunghai Univ., Tunghai, Taiwan
  • fYear
    2014
  • fDate
    2-4 July 2014
  • Firstpage
    487
  • Lastpage
    492
  • Abstract
    Three-party authenticated key exchange protocol is designed for securing the communication between two users with the help of a trusted server. The users can encrypt data with the exchanged secret keys and then transmit the cipher text to each other. However, the inefficiency, unreliability, and inflexibility problems that can be found in many previous studies should be solved. Therefore, in this paper, we propose a secure multiple key exchange scheme, named the High-efficient Multi-key Exchange protocol based on Three-party Authentication (HeM3A for short), which provides users with a secure method to exchange their encryption keys by utilizing the elliptic curve cryptographic method, the logical XOR operation and the binary addition. The propose is hiding important parameters so as to avoid them from being cracked by hackers easily, and resist known-key, impersonation, replay and eavesdropping attacks. The multi-key exchange process, which provides higher security and performance than previous protocols, is practically useful in securing mobile applications.
  • Keywords
    computer crime; cryptographic protocols; mobile computing; mobile radio; private key cryptography; public key cryptography; telecommunication security; trusted computing; HeM3A; binary addition; ciphertext transmission; data encryption; eavesdropping attack; elliptic curve cryptographic method; encryption key exchange; hacker prevention; high-efficient multikey exchange protocol; impersonation attack; logical XOR operation; mobile application security; multiple key exchange scheme security; replay attack; secret key exchange; three-party authenticated key exchange protocol; trusted server; Authentication; Elliptic curve cryptography; Mobile communication; Protocols; Servers; binary addition; elliptic curve cryptosystem; key exchange; parameter hiding; three-party authentication;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2014 Eighth International Conference on
  • Conference_Location
    Birmingham
  • Print_ISBN
    978-1-4799-4333-3
  • Type

    conf

  • DOI
    10.1109/IMIS.2014.70
  • Filename
    6975512