Title :
High-Efficient Multi-key Exchange Protocol Based on Three-Party Authentication
Author :
Kun-Lin Tsai ; Yi-Li Huang ; Fang-Yie Leu ; Jiu-Soon Tan ; Mengyuan Ye
Author_Institution :
Dept. of Electr. Eng., Tunghai Univ., Tunghai, Taiwan
Abstract :
Three-party authenticated key exchange protocol is designed for securing the communication between two users with the help of a trusted server. The users can encrypt data with the exchanged secret keys and then transmit the cipher text to each other. However, the inefficiency, unreliability, and inflexibility problems that can be found in many previous studies should be solved. Therefore, in this paper, we propose a secure multiple key exchange scheme, named the High-efficient Multi-key Exchange protocol based on Three-party Authentication (HeM3A for short), which provides users with a secure method to exchange their encryption keys by utilizing the elliptic curve cryptographic method, the logical XOR operation and the binary addition. The propose is hiding important parameters so as to avoid them from being cracked by hackers easily, and resist known-key, impersonation, replay and eavesdropping attacks. The multi-key exchange process, which provides higher security and performance than previous protocols, is practically useful in securing mobile applications.
Keywords :
computer crime; cryptographic protocols; mobile computing; mobile radio; private key cryptography; public key cryptography; telecommunication security; trusted computing; HeM3A; binary addition; ciphertext transmission; data encryption; eavesdropping attack; elliptic curve cryptographic method; encryption key exchange; hacker prevention; high-efficient multikey exchange protocol; impersonation attack; logical XOR operation; mobile application security; multiple key exchange scheme security; replay attack; secret key exchange; three-party authenticated key exchange protocol; trusted server; Authentication; Elliptic curve cryptography; Mobile communication; Protocols; Servers; binary addition; elliptic curve cryptosystem; key exchange; parameter hiding; three-party authentication;
Conference_Titel :
Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2014 Eighth International Conference on
Conference_Location :
Birmingham
Print_ISBN :
978-1-4799-4333-3
DOI :
10.1109/IMIS.2014.70