An ID-based authenticated three-party key exchange protocol
Journal: ACCENTS Transactions on Information Security (TIS) (Vol.2, No. 7)Publication Date: 2017-07-29
Authors : Susmita Mandal; Sujata Mohanty; Banshidhar Majhi;
Page : 62-72
Keywords : Anonymity; Non-repudiation; ID-based; Elliptic curve cryptography; AVISPA tool.;
Abstract
For secure communication in an open and distributed network, three-party authenticated key exchange (3PAKE) protocol establishes a secure session key between two users with the help of a trusted server to ensure transaction confidentiality and efficiency. Existing schemes fail to achieve privacy to user's identity also unable to ensure undeniability of a service request. Therefore, we propose an authenticated three-party key exchange scheme based on the elliptic curve computational diffie-hellman assumption (ECDH). The proposed scheme not only achieves anonymity, non-repudiation but also reduces the overall computational cost. The scheme is validated in automated validation of internet security protocols and applications (AVISPA) tool and is proved secure in the random oracle model. The scheme has huge applications in real life scenarios, namely, mobile-commerce; secure message transmission, and e-voting.
Other Latest Articles
- Key management infrastructure in cloud computing environment-a survey
- Weighted threshold ECDSA for securing bitcoin wallet
- An efficient ID-based partially blind signature scheme and application in electronic-cash payment system
- A survey on security of mobile handheld devices through elliptic curve cryptography
- USE OF PSYCHOMETRICS IN ORGANISATION DEVELOPMENT
Last modified: 2017-03-15 16:00:32