D. Gupta, Krittibas Parai, M. Obaidat, S. H. Islam
{"title":"Efficient and Secure Design of ID-3PAKA Protocol Using ECC","authors":"D. Gupta, Krittibas Parai, M. Obaidat, S. H. Islam","doi":"10.1109/cits52676.2021.9618445","DOIUrl":null,"url":null,"abstract":"In this modern era, the need for key agreement protocols equipped with high-speed Internet has become necessary in information/network security. An authenticated key agreement (AKA) protocol is a technique that negotiates a secret session key among various users in a network and is used in many scenarios like mutual authentication, data integrity, and many more. The current state-of-the-art include many AKA protocols that are either vulnerable to different attacks or incur massive communication and computational costs. This paper proposes an identity-based three-party authenticated key agreement (ID-3PAKA) protocol using elliptic curve cryptography (ECC). The proposed ID-3PAKA protocol generates a shared secret session key among three users. The security of the proposed ID-3PAKA protocol relies on the hardness assumption of the ECDLP and the CDH problems. The proposed ID-3PAKA protocol is safe against active and passive attacks, which is proved through the simulation of the OFMC and Cl-AtS back-ends of the AVISPA tool.","PeriodicalId":211570,"journal":{"name":"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/cits52676.2021.9618445","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In this modern era, the need for key agreement protocols equipped with high-speed Internet has become necessary in information/network security. An authenticated key agreement (AKA) protocol is a technique that negotiates a secret session key among various users in a network and is used in many scenarios like mutual authentication, data integrity, and many more. The current state-of-the-art include many AKA protocols that are either vulnerable to different attacks or incur massive communication and computational costs. This paper proposes an identity-based three-party authenticated key agreement (ID-3PAKA) protocol using elliptic curve cryptography (ECC). The proposed ID-3PAKA protocol generates a shared secret session key among three users. The security of the proposed ID-3PAKA protocol relies on the hardness assumption of the ECDLP and the CDH problems. The proposed ID-3PAKA protocol is safe against active and passive attacks, which is proved through the simulation of the OFMC and Cl-AtS back-ends of the AVISPA tool.