中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 软件所图书馆  > 期刊论文
Title:
new identity-based three-party authenticated key agreement protocol with provable security
Author: Xiong Hu ; Chen Zhong ; Li Fagen
Keyword: Access control ; Network security
Source: Journal of Network and Computer Applications
Issued Date: 2012
Volume: 36, Issue:2, Pages:-
Indexed Type: EI
Department: (1) School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu PR China; (2) Key Laboratory of Network and Software Security Assurance of the Ministry of Education Institute of Software School of Electronics Engineering and Computer Science Peking University Beijing PR China; (3) State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing PR China
Abstract: Key agreement allows multi-parties exchanging public information to create a common secret key that is known only to those entities over an insecure network. In the recent years, several identity-based (ID-based) authenticated key agreement protocols have been proposed and most of them broken. In this paper, we formalize the security model of ID-based authenticated tripartite key agreement protocol and propose a provably secure ID-based authenticated key agreement protocol for three parties with formal security proof under the computational Diffie-Hellman assumption. Experimental results by using the AVISPA tool show that the proposed protocol is secure against various malicious attacks. © 2012 Elsevier Ltd. All rights reserved.
English Abstract: Key agreement allows multi-parties exchanging public information to create a common secret key that is known only to those entities over an insecure network. In the recent years, several identity-based (ID-based) authenticated key agreement protocols have been proposed and most of them broken. In this paper, we formalize the security model of ID-based authenticated tripartite key agreement protocol and propose a provably secure ID-based authenticated key agreement protocol for three parties with formal security proof under the computational Diffie-Hellman assumption. Experimental results by using the AVISPA tool show that the proposed protocol is secure against various malicious attacks. © 2012 Elsevier Ltd. All rights reserved.
Language: 英语
WOS ID: WOS:000316091900031
Citation statistics:
Content Type: 期刊论文
URI: http://ir.iscas.ac.cn/handle/311060/15129
Appears in Collections:软件所图书馆_期刊论文

Files in This Item:

There are no files associated with this item.


Recommended Citation:
Xiong Hu,Chen Zhong,Li Fagen. new identity-based three-party authenticated key agreement protocol with provable security[J]. Journal of Network and Computer Applications,2012-01-01,36(2):-.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Xiong Hu]'s Articles
[Chen Zhong]'s Articles
[Li Fagen]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Xiong Hu]‘s Articles
[Chen Zhong]‘s Articles
[Li Fagen]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2020  中国科学院软件研究所 - Feedback
Powered by CSpace