Two-party certificateless authenticated key agreement protocol with enhanced security

来源 :中国邮电高校学报(英文版) | 被引量 : 0次 | 上传用户:asdfghjkf
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Two-party certificateless authenticated key agreement (CL-AKA) protocol is a hot topic in the field of wireless communication security.An improved two-party CL-AKA protocol with enhanced security is proposed,which is of provable security and unforgeability in the extended Canetti-Krawczyk (eCK) security model based on the hardness assumption of the computational Diffie Hellman (CDH) problem.Compared with other similar protocols,it is more efficient and can satisfy security properties such as free of the centralized management of certificate and key,free of bilinear pairings,two-party authentication,resistant to unknown key-share attack,key compromise impersonation attacks,the man-in-the-middle-attack (MIMA) of key generation center (KGC),etc.These properties make the proposed protocol have better performance and adaptability for military communication.
其他文献
Paxos is a well-known distributed algorithm that provides strong consistency.However,the original Paxos has several shortcomings,including those of slow elections,redundant communications and excessive traffic of the coordinator node.In order to tackle th
Hybrid analog-digital beamforming is recognized as a promising solution for a practical implementation of massive multiple-input multiple-output (MIMO) systems based on millimeter-wave (mmWave) technology.In view of the overwhelming hardware cost and exce
Mobility prediction is one of the promising technologies for improving quality of service (QoS) and network resource utilization.In future heterogeneous networks (HetNets),the network topology will become extremely complicated due to the widespread deploy
Updatable block-level message-locked encryption (MLE) can efficiently update encrypted data,and public auditing can verify the integrity of cloud storage data by utilizing a third party auditor (TPA).However,there are seldom schemes supporting both updata
Using relay in the wireless communication network is an efficient way to ensure the data transmission to the distant receiver.In this paper,a dynamic power control (DPC) approach is proposed for the amplify-and-forward (AF) relay-aided downlink transmissi
Real-time graphics processing is all along a crucial task of mobile device,and it is conventionally supported by programmable graphics processing unit (GPU).These GPUs are designed to flexibly support vertex and pixel processing with classic techniques su
Aiming at the problem that more popular network application and more complicated network traffic bring big challenge to current Trojan detecting technique,communication behavior of remote access Trojan (RAT) is analyzed,traffic features\' different perf
A novel low profile multiband rectenna was proposed for harvesting the 2nd generation(2G),the 3rd generation (3G),the 4th generation (4G),wireless local area networks (WLANs) etc.,electromagnetic wave energy.The proposed rectenna consists of a novel multi
The ubiquity of wireless communication systems has resulted in extensive concern regarding their security issues.A practical secure transmission scheme based on under-sampling spectrum-sparse signals is designed.Secure transmission is initialized as the i
A segmentation multi-dimensional crest factor reduction (SMD-CFR) algorithm is proposed for multi-service supporting digital radio over fibre (DRoF) system.Benefit from segmentation dynamic clipping threshold and clipping factor got basing on characterist