Back to Search Start Over

Privacy-Preserved Key Agreement with User Authentication

Authors :
Chien-Lung Hsu
Tzu-Wei Lin
Source :
AsiaJCIS
Publication Year :
2015
Publisher :
IEEE, 2015.

Abstract

With the progress of information technology, thecomputer crimes are emerging in an endless stream. It is because of the user's privacy should be protected, when the user submit a service request to the service provider, both of them should check the identity of the other, and then build a shared key to accomplish the service request. In this paper, we adopt the identity-based cryptosystem and the elliptic curve cryptosystem to design a privacy-preserved key agreement with user authentication. This protocol can achieve several properties: mutual authentication, deniability, and forward secrecy. Besides, the performance of the proposed protocol based on RSA is better than previous studies.

Details

Database :
OpenAIRE
Journal :
2015 10th Asia Joint Conference on Information Security
Accession number :
edsair.doi...........0c3050811fcc9f1cc1dfb9525d29b618
Full Text :
https://doi.org/10.1109/asiajcis.2015.18