Please wait a minute...
Front. Inform. Technol. Electron. Eng.  2013, Vol. 14 Issue (5): 347-355    DOI: 10.1631/jzus.C1200273
    
Efficient and secure three-party authenticated key exchange protocol for mobile environments
Chih-ho Chou, Kuo-yu Tsai, Tzong-chen Wu, Kuo-hui Yeh
Department of Information Management, National Taiwan University of Science and Technology, Taiwan 106, Taipei; Department of Management Information Systems, Hwa Hsia Institute of Technology, Taiwan 235, New Taipei; Department of Information Management, National Dong Hwa University, Taiwan 974, Hualien
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      

Abstract  Yang and Chang (2009) proposed a three-party authenticated key exchange protocol for securing communications in mobile-commerce environments. Their protocol reduces computation and communication costs by employing elliptic curve cryptosystems. However, Tan (2010) pointed out that Yang and Chang (2009)’s protocol cannot withstand impersonation and parallel attacks, and further proposed an enhanced protocol to resist these attacks. This paper demonstrates that Tan (2010)’s approach still suffers from impersonation attacks, and presents an efficient and secure three-party authenticated key exchange protocol to overcome shown weaknesses.

Key wordsThree-party      Key exchange      Authentication      Mobile environments     
Received: 22 September 2012      Published: 30 April 2013
CLC:  TP393  
  TN929.5  
Cite this article:

Chih-ho Chou, Kuo-yu Tsai, Tzong-chen Wu, Kuo-hui Yeh. Efficient and secure three-party authenticated key exchange protocol for mobile environments. Front. Inform. Technol. Electron. Eng., 2013, 14(5): 347-355.

URL:

http://www.zjujournals.com/xueshu/fitee/10.1631/jzus.C1200273     OR     http://www.zjujournals.com/xueshu/fitee/Y2013/V14/I5/347


Efficient and secure three-party authenticated key exchange protocol for mobile environments

Yang and Chang (2009) proposed a three-party authenticated key exchange protocol for securing communications in mobile-commerce environments. Their protocol reduces computation and communication costs by employing elliptic curve cryptosystems. However, Tan (2010) pointed out that Yang and Chang (2009)’s protocol cannot withstand impersonation and parallel attacks, and further proposed an enhanced protocol to resist these attacks. This paper demonstrates that Tan (2010)’s approach still suffers from impersonation attacks, and presents an efficient and secure three-party authenticated key exchange protocol to overcome shown weaknesses.

关键词: Three-party,  Key exchange,  Authentication,  Mobile environments 
[1] Kuo-Hui Yeh. A lightweight authentication scheme with user untraceability[J]. Front. Inform. Technol. Electron. Eng., 2015, 16(4): 259-271.
[2] Kuo-Hui Yeh, Kuo-Yu Tsai, Jia-Li Hou. Analysis and design of a smart card based authentication protocol[J]. Front. Inform. Technol. Electron. Eng., 2013, 14(12): 909-917.
[3] Baiying Lei, Ing Yann Soon. A multipurpose audio watermarking algorithm with synchronization and encryption[J]. Front. Inform. Technol. Electron. Eng., 2012, 13(1): 11-19.
[4] Rong FAN, Dao-jing HE, Xue-zeng PAN, Ling-di PING. An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks[J]. Front. Inform. Technol. Electron. Eng., 2011, 12(7): 550-560.
[5] Chung-Fu Lu, Tzong-Chen Wu, Chien-Lung Hsu. A three-level authenticated conference key establishment protocol for UMTS networks[J]. Front. Inform. Technol. Electron. Eng., 2011, 12(5): 371-378.
[6] Xian-ting ZENG, Xue-zeng PAN, Ling-di PING, Zhuo LI. Robust lossless data hiding scheme[J]. Front. Inform. Technol. Electron. Eng., 2010, 11(2): 101-110.
[7] Horng-Twu Liaw, Chih-Ta Yen, Meng-Yu Chiu, Li-Lin Hsiao. Efficient password authentication schemes based on a geometric approach for a multi-server environment[J]. Front. Inform. Technol. Electron. Eng., 2010, 11(12): 989-997.