A Three-Party Dynamic Identity-Based Authenticated Key Exchange Protocol with Forward Anonymity
- 51 Downloads
The three-party (two clients and one server) authenticated key exchange protocols use a pre-shared password to authenticate each other, and then by the help of server to make the two clients compute a novel session key. At present, the situation of this application is very different from those considered in the conventional literatures, and the biggest two differences are that most of the former literatures cannot guarantee the user anonymity and forward anonymity. Therefore, we propose a new three-party key exchange protocol based on dynamic identity authentication with forward anonymity, so that if the server’s long-term key is compromised, user anonymity cannot be broken or the identities of the users cannot be traced, and both sides of the communication with the help of the authentication server can be mutual authentication and the establishment of a session key. Compared with the three-party key exchange protocols, our protocol is more effective in computing cost and communication cost for more suitable towards resource-constrained environment.
KeywordsDynamic identity Forward security Forward anonymous Authentication Key exchange
This work was supported by the 2019 Liaoning Provincial Natural Science Foundation of China: “Research on privacy authentication mechanism and multi-party intelligent contract system based on blockchain technology”.
- 7.Yang, J., Seo, C., & Cho, J. (2007). A three-party authenticated key exchange scheme smartcard using elliptic curve cryptosystem for secure key exchange in wireless sensor network. In ISCE 2007 (pp. 1–6).Google Scholar
- 9.Hao, F. (2010). On robust key agreement based on public key authentication (Short Paper). In International conference on financial cryptography & data security (pp. 383–390). Springer.Google Scholar
- 10.Wang, D., Ma, C., Wang, P., & Chen, Z. (2012). Robust smart card based password authentication scheme against smart card security breach. In IACR cryptology ePrint archive.Google Scholar
- 11.Lee, H., Nam, J., Kim, M., & Won, D. (2016). Forward anonymity-preserving secure remote authentication scheme. KSII Transactions on Internet and Information Systems,3(10), 1298–1310.Google Scholar
- 13.SK Hafizul Islam. (2014). Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps. Dordrecht: Springer.Google Scholar
- 14.Yi, T., Chen, H., & Wu, D. (2013). Improved password-based key exchange protocol for three-parties. Computer Applications and Software, 30(1), 313–315.Google Scholar
- 17.Jeong, I. R., Katz, J., & Lee, D. H. (2004). One-round protocols for two-party authenticated key exchange. In International conference on applied cryptography and network security (pp. 220–232).Google Scholar
- 21.Wang, H., Zhang, H., Li, J., & Xu, C. (2013). A (3, 3) visual cryptography scheme for authentication. Journal of Shenyang Normal University (Natural Science Edition),31(101(03)), 397–400.Google Scholar