4.5 Article

A secure and efficient identity-based authenticated key exchange protocol for mobile client-server networks

Journal

JOURNAL OF SUPERCOMPUTING
Volume 69, Issue 1, Pages 395-411

Publisher

SPRINGER
DOI: 10.1007/s11227-014-1170-5

Keywords

Elliptic curve cryptography; Key exchange protocol; Mutual authentication; Client-server network

Ask authors/readers for more resources

Recently, Chou et al. (J Supercomput 66(2): 973-988, 2013) proposed two identity-based key exchange protocols using elliptic curves for mobile environments. The first one is an two-party authentication key exchange protocol to establish a session key between a client and a remote server. The second one is an extended version for three-party setting to establish a session key between two clients with the help of a trusted server. However, this paper finds the first one vulnerable to impersonation attack and key-compromise impersonation attack, and the second one insecure against impersonation attack. To overcome the weaknesses, we propose an improved identity-based two-party authentication key exchange protocol using elliptic curves. The rigorous analysis shows that our scheme achieves more security than related protocols.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available