25,011 Hits in 5.7 sec

Anonymity and one-way authentication in key exchange protocols

Ian Goldberg, Douglas Stebila, Berkant Ustaoglu
2012 Designs, Codes and Cryptography  
We also describe an attack on a previous protocol of Øverlier and Syverson, and present a new, efficient key exchange protocol that provides one-way authentication and anonymity.  ...  It has been studied extensively in theory and widely deployed in practice. In the research literature a typical protocol in the public-key setting aims for key secrecy and mutual authentication.  ...  Goldberg acknowledges the financial support of the Natural Sciences and Engineering Research Council (NSERC) of Canada and Mprime.  ... 
doi:10.1007/s10623-011-9604-z fatcat:tgxqgbvrszedpj2rxfkizlf2di

Mutual Authentication and Key Exchange Protocols with Anonymity Property for Roaming Services [chapter]

Yixin Jiang, Chuang Lin, Xuemin Shen, Minghui Shi
2005 Lecture Notes in Computer Science  
Two novel mutual authentication and key exchange protocols with anonymity are proposed for different roaming scenarios in the global mobility network (GLOMONET).  ...  The proposed protocols have new features, such as identity anonymity and one-time session key progression. Identity anonymity protects mobile users' privacy in the roaming network environment.  ...  and key exchange protocols with anonymity property for roaming service.  ... 
doi:10.1007/11422778_10 fatcat:kl52ci7265b3hftls6mhdut3um

A Robust User Authentication Protocol with Anonymity, Deniability, Key Agreement and Efficiency

Chien-Lung Hsu, Yu-Hao Chuang
2013 Applied Mathematics & Information Sciences  
, iii) key agreement, and iv) efficiency.  ...  An authentication protocol allows on-line service providers to validate the identity or legitimacy of a logging user.  ...  This work was supported in part by the Chang Gung University Grant UARPD3B0061 and in part by National Science Council under the grant NSC 100-2628-H-182-001-MY3.  ... 
doi:10.12785/amis/070114 fatcat:ouvkjjpeijdxzcamuqosns3rxm

Analysis of Key Exchange Protocols using Session Keys

Pranav JVyas, Bhushan H Trivedi
2012 International Journal of Applied Information Systems  
This paper analyze techniques of exchanging key through which encryption is performed.  ...  We review the techniques on various parameters and find which technique is best suitable for use in mobile computers with limited processing power and battery capacity while efficiently working on wireless  ...  User anonymity is not present in this protocol as mutual authentication requires each party to identify itself before key is exchanged.  ... 
doi:10.5120/ijais12-450164 fatcat:ih7e2ahli5dabgzozz5ppp53fy

Key Exchange with Anonymous Authentication Using DAA-SIGMA Protocol [chapter]

Jesse Walker, Jiangtao Li
2011 Lecture Notes in Computer Science  
In this paper, we show how to incorporate DAA schemes into a key exchange protocol between two entities to achieve anonymous authentication and to derive a shared key between them.  ...  We propose a modification to the SIGMA key exchange protocol used in the Internet Key Exchange (IKE) standards to support anonymous authentication using DAA.  ...  Acknowledgement We thank Liqun Chen for her helpful discussions and feedback.  ... 
doi:10.1007/978-3-642-25283-9_8 fatcat:git2vz37zvacxigqnlwqnvfxze

Protecting Key Exchange and Management Protocols Against Resource Clogging Attacks [chapter]

Rolf Oppliger
1999 Secure Information Networks  
The mechanism was later approved by the IETF IPsec WG to be included into the Internet Key Management Protocol (IKMP) or Internet Key Exchange (IKE) protocol respectively.  ...  Many cryptographic key exchange and management protocols involve computationally expensive operations, such as modular exponentiations, and are therefore vulnerable to resource clogging attacks.  ...  In addition, the author also thanks the anonymous reviewers for their useful comments.  ... 
doi:10.1007/978-0-387-35568-9_11 fatcat:badtrld5ebbnhdwls4ne3k7pwi

Anonymity preserving and round effective three-party authentication key exchange protocol based on chaotic maps

Kyongsok Pak, Songho Pak, Cholman Ho, Myongsuk Pak, Choljin Hwang, Muhammad Khurram Khan
2019 PLoS ONE  
We propose a round-effective three-party authentication key exchange (3PAKE) protocol that provides user anonymity and we analyse its security properties based on BAN logic and AVISPA tool.  ...  Providing user anonymity in the authentication key exchange is one of the important security requirements to protect users' personal secrets. We analyse Lu et al.'  ...  The authentication key exchange protocol is keys exchange for the secret communication based on authentication between the communicating parties in essence.  ... 
doi:10.1371/journal.pone.0213976 pmid:30893354 pmcid:PMC6426243 fatcat:s5665eyfhffc3kzlwjbtvgeuvm

An anonymous batch handover authentication protocol for big flow wireless mesh networks

Dongcheng Wang, Li Xu, Feng Wang, Qikui Xu
2018 EURASIP Journal on Wireless Communications and Networking  
In this paper, an anonymous batch handover authentication protocol is proposed using group signature technique to pre-distribute handover keys.  ...  Unlike existing protocols based on group signature, the proposed protocol does not involve group signature correlation operations in the handover authentication phase, hence achieving a better performance  ...  [21] Our protocol the man-in-the-middle attack also has been solved in our protocol. The session key exchange in our protocol is designed based on the CDH.  ... 
doi:10.1186/s13638-018-1217-z fatcat:q2z3szr7jvcptfjmwf5an44tda

Universally composable and forward-secure RFID authentication and authenticated key exchange

Tri Van Le, Mike Burmester, Breno de Medeiros
2007 Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07  
We also introduce new, provably secure, and highly practical protocols for anonymous authentication and key-exchange by RFID devices.  ...  The new protocols satisfy forward-secure anonymity, authenticity, and availability requirements in the Universal Composability model.  ...  In this paper we articulate security models for anonymous RFID authentication and key exchange protocols. These models extend the framework introduced in [9] in several ways.  ... 
doi:10.1145/1229285.1229319 dblp:conf/ccs/LeBM07 fatcat:o3nfbi74orgwtcb6vgkpwhoicm

Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension

Duncan S. Wong, Guomin Yang, Xiaotie Deng
2007 Journal of universal computer science (Online)  
In this paper, we propose a formal key exchange definition and formalize secure roaming under the Canetti-Krawczyk (CK) model.  ...  By using the modular approach supported by the CK-model, we construct an efficient key exchange protocol for roaming and then extend it to support user anonymity and untraceability.  ...  Xiaojian Tian and the anonymous reviewers for their careful reading and useful comments. The work was supported by CityU grants (Project Nos. 7001844, 7001959, 7002001).  ... 
doi:10.3217/jucs-014-03-0441 dblp:journals/jucs/YangWD08 fatcat:77lxpwu7ffbhzjoxh4zjkgtqt4

Where EAP security claims fail

Katrin Hoeper, Lidong Chen
2007 The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops - QSHINE '07  
In particular, we present a series of attacks which cause some standard security claims, namely channel binding, protected ciphersuite negotiation and cryptobinding, to fail and compromise the key exchange  ...  The Extensible Authentication Protocol (EAP) is widely used as an authentication framework to control the access to wireless networks, e.g. in IEEE 802.11 and IEEE 802.16 networks.  ...  In a successful attack, the adversary first launches a MitM attack on the outer anonymous key exchange, as described in Section 3.2 and illustrated in Figure 3 .  ... 
doi:10.1145/1577222.1577285 dblp:conf/qshine/HoeperC07 fatcat:rlmfrriavfc3vdnzoksuemxbni

Cryptanalysis Of Two-Factor Authenticated Key Exchange Protocol In Public Wireless Lans

Hyunseung Lee, Donghyun Choi, Yunho Lee, Dongho Won, Seungjoo Kim
2009 Zenodo  
In Public Wireless LANs(PWLANs), user anonymity is an essential issue. Recently, Juang et al. proposed an anonymous authentication and key exchange protocol using smart cards in PWLANs.  ...  s protocol is vulnerable to the stolen-verifier attack and does not satisfy user anonymity.  ...  There are many ways to authenticate users and the password-based authentication scheme is one of the most used authentication mechanisms.  ... 
doi:10.5281/zenodo.1073560 fatcat:wsgbbxkvfjgpdptru2plr7w5uq

A secure and useful "keyless cryptosystem"

Mordechai M. Yung
1985 Information Processing Letters  
CUCS -136-84 Keyless cryptography IS a technique in which the basis of security IS the anonymity of the sender.  ...  \Ve descnbe a protocol which fits the technique to realistic communication environments, and extend the security and the range of applicatlOns of the technique.  ...  Acknowledgement I would like to thank an anonymous referee for the terms 'anonymous' and 'semianonymous' channels.  ... 
doi:10.1016/0020-0190(85)90106-1 fatcat:fj65taorebb6rmfaq7aakk4n2a

A Chebyshev-Map Based One-Way Authentication and Key Agreement Scheme for Multi-Server Environment

Zengyu Cai, Yuan Feng, Junsong Zhang, Yong Gan, Qikun Zhang
2015 International Journal of Security and Its Applications  
Stebila and B. Ustaoglu, “Anonymity and one-way authentication in key exchange protocols”, Designs, Codes and Cryptography, vol. 67, no. 2, (2013). [21] X. Wang and J.  ...  The Proposed Protocol can Achieve One-Way Authentication and Key Agreement Proof: In our proposed authentication scheme, one-way authentication means that RC helps an anonymous user Uj to authenticate  ... 
doi:10.14257/ijsia.2015.9.6.15 fatcat:4ujsihxg7jf27a4eak7b7cjrsq

Anonymous and Authenticated Key Exchange for Roaming Networks

Guomin Yang, Duncan Wong, Xiaotie Deng
2007 IEEE Transactions on Wireless Communications  
In this paper, we propose a novel construction approach of anonymous and authenticated key exchange protocols for a roaming user and a visiting server to establish a random session key in such a way that  ...  Merits of our generic protocol construction include eliminating alias synchronization between the user and the home server, supporting joint key control, and not relying on any special security assumptions  ...  ACKNOWLEDGEMENTS We would like to thank Xi Zhang, Yuguang Fang and all the anonymous reviewers for their helpful comments and suggestions.  ... 
doi:10.1109/twc.2007.06020042 fatcat:ajof4co5nbeqpcb62ae2hx26nq
« Previous Showing results 1 — 15 out of 25,011 results