Title :
Efficient Authenticated Key-Exchange for Devices with a Trusted Manager
Author :
Ge, He ; Tate, Stephen R.
Author_Institution :
Dept. of Comput. Sci. & Eng., North Texas Univ., Denton, TX
Abstract :
We propose an efficient authentication method for secure communication among a set of devices that have a single trusted manager or administrator, with protocols presented for authentication and authenticated key exchange. An example of such a setting would be a set of devices or sensors owned by a single person, including applications such as a smart house or coordinated control systems, with emphasis on the simplicity and efficiency of the protocol. While known techniques can solve this problem, we show how specific properties of our setting can allow our more efficient solution, which is more appropriate for embedded processors with limited computational capabilities. Specifically, a device using our protocol can authenticate itself using only about 15% of the computation required by a standard RSA signature-based authentication. We prove that our scheme is secure under the strong RSA assumption and the computational Diffie-Hellman assumption
Keywords :
message authentication; RSA assumption; authenticated key exchange; authentication protocol; computational Diffie-Hellman assumption; coordinated control system; device administrator; device set trusted manager; embedded processor; secure communication; signature-based authentication; smart house; Authentication; Communication system control; Communication system security; Control systems; Embedded computing; Embedded system; Identity-based encryption; Polynomials; Protocols; Sensor systems; Assumption; Authentication; Embedded Systems; Key Exchange; Strong RSA;
Conference_Titel :
Information Technology: New Generations, 2006. ITNG 2006. Third International Conference on
Conference_Location :
Las Vegas, NV
Print_ISBN :
0-7695-2497-4
DOI :
10.1109/ITNG.2006.57