An enhanced key exchange protocol exhibiting key compromise impersonation attacks resistance in mobi

来源 :中国科学:信息科学(英文版) | 被引量 : 0次 | 上传用户:fengyun163
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Dear editor,rnNumerous three-party authenticated key exchange (3PAKE)protocols have been presented,which allow the establish-ment of a secure session by utilizing a session key shared between two clients with the assistance of a server trusted by both the clients via an unprotected network communica-tion environment.The 3PAKE protocols can be applied to various scenarios,including mobile commerce environment.Recently,focusing on this topic,Islam et al.[1]presented an improved protocol (IAB-3PAKE) for mobile commerce envi-ronment,which remedied some flaws existing in Tan\'s pro-tocol[2].Unfortunately,the IAB-3PAKE protocol still ex-hibits the weakness of key compromise impersonation (KCI)attacks;an attacker can impersonate the server to share a session key with one of the clients if the client\'s long-term private key is acquired by the attacker.Further,with re-gard to the possible leakage of private keys,Wei et al.[3]reported that the private key can be recovered under some conditions.
其他文献
Dear editor,rnHigher-order masking is one of the most effective coun-termeasures against differential power analysis attacks(DPA)[1].However,this measure has not yet been widely applied to real-life applications because it suffers from heavy masking-overh
期刊
Dear editor,rnThe conventional von Neumann computer system has the memory wall problem[1],which limits the computation speed and causes high energy and latency of the comput-ing system.To realize computing systems able to process massive data and complex
期刊
Complete temperature field estimation from limited local measurements is widely desired in many industrial and scientific applications of thermal engineering.Since the sensor configuration dominates the reconstruction performance,some progress has been ma
The computational efficiency of the traditional serial spherical discontinuous deformation analysis (SDDA) program has limited its application in geotechnical engineering problems that need a large number of spheres.The cloud computing technology is used
The necessity for safety in oil-gas storage and transportation has led to increasing technical requirements for on-line monitoring of damaged pores and oil leakage from tanks.In this study,the severity of damage of the oil tank at the micron level was det
Dear editor,rnCracking has been generally regarded as an undesirable phe-nomenon to be avoided owing to their highly stochastic process and irreversibility.However,to induce nanocracks deliberately has been widely investigated because of their great poten
期刊
It is of the utmost importance to promote the charge transport and retard the heterojunction barrier in the functional layers and at their adjacent interfaces to pursuit excellent photovoltaic characteristics of the perovskite solar cells (PSCs).Here,room
Nanoporous metals have received significant attention as a new class of structural and functional materials.However,the macroscopic brittle fracture under the tensile test is an impediment to their practical applications.Thus,it is of central importance t
The accurate estimation of the end-effector\'s pose in large operating spaces is the key for the mobile manipulator to realize efficient manufacturing of large and complex components.We propose a novel pose tracking method in large-range using visual fi
Dear editor,rnThe SM3 cryptographic hash algorithm[1]was approved as the only standard hash function in China and stan-dardized as a Chinese National Standard (GB standard) in 2016.Soon after,SM3 was standardized by the Interna-tional Organization for Sta
期刊