An Authentication and Key Agreement Mechanism for Multi-domain Wireless Networks Using Certificateless Public-Key Cryptography
详细信息    查看全文
  • 作者:Ming Luo ; Hong Zhao
  • 关键词:Mutual authentication ; Key agreement ; Certificateless public key cryptography ; Smart card ; Bilinear pairing
  • 刊名:Wireless Personal Communications
  • 出版年:2015
  • 出版时间:March 2015
  • 年:2015
  • 卷:81
  • 期:2
  • 页码:779-798
  • 全文大小:579 KB
  • 参考文献:1. Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In / Advances in cryptology - CRYPTO-4 (pp. 47-3). Berlin, Germany.
    2. Gentry, C. (1984). Certificate-based encryption and the certificate revocation problem. In / Advances in cryptology-EUROCRPYT 2003 (pp. 272-93). Berlin, Germany.
    3. Al-Riyami, S. S., & Paterson, K.G. (2003). Certificateless public key cryptography. In / Advances in cryptography-ASIACRYPT 2003 (pp. 452-73). Berlin, Germany.
    4. Choi, K. Y., Park, J. H., Hwang, J. Y., & Lee, D. H. (2007). Efficient certificateless signature schemes. In / advances in ACNS 2007 (pp. 443-58). Berlin, Germany.
    5. Zhang, G., & Wang, S. (2008). A certificateless signature and group signature schemes against malicious PKG. In / Proceedings of 22nd international conference on advanced information networking and applications (AINA 2008), GinoWan, Okinawa, Japan.
    6. Xu, Z., Liu, X., Zhang, G. Q., & He, W. B. (2008). A certificateless signature scheme for mobilewireless cyber-physical systems. In / Proceedings of the 28th international conference on distributed computing systems workshops (ICDCS-8), Beijing, China.
    7. Mandt, T. K., & Tan, C. H. (2006). Certificateless authenticated two-party key agreement protocols. In / advances in the 11th Asian computing science conference (pp. 37-4), Tokyo, Japan.
    8. Luo, M., Wen, Y. Y., & Zhao, H. (2008). An enhanced authentication and key agreement mechanism for SIP using certificateless public-key cryptography. In / Proceedings of the 9th international conference for young computer scientists (ICYCS-8), Zhang Jia Jie, Hunan, China.
    9. Lee, E. J., Lee S. E., & Yoo, K. Y. (2008). A certificateless authenticated group key agreement protocol providing forward secrecy. In / Proceedings of ubiquitous multimedia computing, 2008 (UMC-8), Wrestpoint Hotel, Hobart, Australia.
    10. Boneh, D., Lynn B., & Shacham, H. (2001). Short signatures from the weil pairing. In / Advances in cryptology-Asiacrypt 2001 (pp. 514-32). Berlin, Germany.
    11. Du H. Z., & Wen, Q. Y. (2007). Efficient and provably-secure certificateless short signature scheme from Bilinear Pairings. / Cryptology ePrint archive, Retrieved from: http://eprint.iacr.org/2007/250.pdf
    12. Tso, R., Yi, X., & Huang, X. Y. (2008). Efficient and short certificateless signature. In / Proceedings of the 7th international conference on cryptology and network security (CANS 2008), Hong-Kong, China.
    13. Das, ML, Saxena, A, Gulati, VP, Phatak, DB (2006) A novel remote user authentication scheme using bilinear pairings. Computers and Security 25: pp. 184-189 CrossRef
    14. Goriparthi, T., Das, M. L., Negi, A., & Saxena, A. (2006). Cryptanalysis of recently proposed remote user authentication schemes. / Cryptology ePrint archive, Retrieved from: http://eprint.iacr.org/2006/028.pdf
    15. Giri, D., & Srivastava, P. D. (2006). An improved remote user authentication scheme with smart cards using bilinear pairings. / Cryptology ePrint archive, Retrieved from: http://eprint.iacr.org/2006/274.pdf
    16. Tseng, Y. M., Wu, T. Y., & Wu, J. D. (2007). A mutual authentication and key exchange scheme from bilinear pairings for low power computing devices. In / Proceedings of the 31st annual international computer software and applications conference (COMPSAC 2007), Beijing, China.
    17. Tseng, YM, Wu, TY, Wu, JD (2008) A pairing-based user authentication scheme for wireless clients with smart cards. Informatica 19: pp. 285-302
    18. Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. In / Advances in cryptology-CRYPTO 2001 (pp. 213-29). Berlin, Germany.
    19. Boneh, D, Franklin, M (2003) Identity based encryption from the Weil pairing. SIAM Journal on Computing 32: pp. 586-615 CrossRef
    20. Bellare, M., & Rogaway, P. (1993). Random oracles are practical: a paradigm for designing efficient protocols. In / Proceedings of the 1st annual ACM conference on computer and communications security (ACM CCS-3), Fairfax, Virginia, USA.
    21. Zhang, Z., Wong, D. S., Xu, J., & Feng, D. (2006). Certificateless public-key signature: security model and efficiet construction. In / advances in ACNS 2006 (pp. 293-08). Berlin, Germany.
    22. Goldwasser, S, Micali, S, Rivest, RL (1988) A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing 17: pp. 281-308
文摘
With rapid growth of mobile wireless networks, handheld devices are popularly used by people and many mobile applications have been rapidly developed. Mutual authentication and key agreement are very important security mechanisms in wireless network systems for preventing unauthorized network access, server impersonation attack and malicious attacks of the subsequent session message. Considering the limited computing capability of smart cards or mobile devices, the security scheme design suitable for these mobile devices is a nontrivial challenge. This paper presents an authentication and key agreement mechanism for multi-domain wireless networks using certificateless public key cryptography. Based on the computational Diffie–Hellman assumption and the random oracle model, we show that the proposed scheme is secure against an uncertified user and a malicious registration server simultaneously. As compared with the recently proposed schemes, our scheme enjoys less computational cost on the basis of BLS short signature scheme and has higher security level by exploiting the certificateless public key cryptography system. Moreover, our scheme can be used to mutual authentication and key agreement between members of distinct domains where all the servers use different system parameters. Efficiency analysis of related the security and computation overheads are given to demonstrate that our scheme is well suited for mobile devices with limited computing capability.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700