D. Gupta, Krittibas Parai, M. Obaidat, S. H. Islam
{"title":"基于ECC的ID-3PAKA协议高效安全设计","authors":"D. Gupta, Krittibas Parai, M. Obaidat, S. H. Islam","doi":"10.1109/cits52676.2021.9618445","DOIUrl":null,"url":null,"abstract":"In this modern era, the need for key agreement protocols equipped with high-speed Internet has become necessary in information/network security. An authenticated key agreement (AKA) protocol is a technique that negotiates a secret session key among various users in a network and is used in many scenarios like mutual authentication, data integrity, and many more. The current state-of-the-art include many AKA protocols that are either vulnerable to different attacks or incur massive communication and computational costs. This paper proposes an identity-based three-party authenticated key agreement (ID-3PAKA) protocol using elliptic curve cryptography (ECC). The proposed ID-3PAKA protocol generates a shared secret session key among three users. The security of the proposed ID-3PAKA protocol relies on the hardness assumption of the ECDLP and the CDH problems. The proposed ID-3PAKA protocol is safe against active and passive attacks, which is proved through the simulation of the OFMC and Cl-AtS back-ends of the AVISPA tool.","PeriodicalId":211570,"journal":{"name":"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Efficient and Secure Design of ID-3PAKA Protocol Using ECC\",\"authors\":\"D. Gupta, Krittibas Parai, M. Obaidat, S. H. Islam\",\"doi\":\"10.1109/cits52676.2021.9618445\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this modern era, the need for key agreement protocols equipped with high-speed Internet has become necessary in information/network security. An authenticated key agreement (AKA) protocol is a technique that negotiates a secret session key among various users in a network and is used in many scenarios like mutual authentication, data integrity, and many more. The current state-of-the-art include many AKA protocols that are either vulnerable to different attacks or incur massive communication and computational costs. This paper proposes an identity-based three-party authenticated key agreement (ID-3PAKA) protocol using elliptic curve cryptography (ECC). The proposed ID-3PAKA protocol generates a shared secret session key among three users. The security of the proposed ID-3PAKA protocol relies on the hardness assumption of the ECDLP and the CDH problems. The proposed ID-3PAKA protocol is safe against active and passive attacks, which is proved through the simulation of the OFMC and Cl-AtS back-ends of the AVISPA tool.\",\"PeriodicalId\":211570,\"journal\":{\"name\":\"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/cits52676.2021.9618445\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/cits52676.2021.9618445","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Efficient and Secure Design of ID-3PAKA Protocol Using ECC
In this modern era, the need for key agreement protocols equipped with high-speed Internet has become necessary in information/network security. An authenticated key agreement (AKA) protocol is a technique that negotiates a secret session key among various users in a network and is used in many scenarios like mutual authentication, data integrity, and many more. The current state-of-the-art include many AKA protocols that are either vulnerable to different attacks or incur massive communication and computational costs. This paper proposes an identity-based three-party authenticated key agreement (ID-3PAKA) protocol using elliptic curve cryptography (ECC). The proposed ID-3PAKA protocol generates a shared secret session key among three users. The security of the proposed ID-3PAKA protocol relies on the hardness assumption of the ECDLP and the CDH problems. The proposed ID-3PAKA protocol is safe against active and passive attacks, which is proved through the simulation of the OFMC and Cl-AtS back-ends of the AVISPA tool.