An efficient and secure three-pass authenticated key agreement elliptic curve based protocol

Zeyad Mohammad*, Chien Lung Hsu, Yaw-Chung Chen, Chi Chun Lo

*Corresponding author for this work

Research output: Contribution to journalArticle

8 Scopus citations

Abstract

Key agreement protocols are a fundamental building block of cryptography to establish a common secret key over public network. We propose an efficient and secure three-pass authenticated key agreement protocol based on elliptic curve where three-pass protocols have significant advantages over two-pass in terms of security properties and applications. The three-pass protocols can prevent denial of service attacks in complex and unpredictable communication environments such as wireless networks and Internet. We show the proposed protocol can withstand a stronger adversary under eCK security model by using a trick in its block of hashing a static secret key with an ephemeral secret key. Furthermore, it can provide an assurance of the identity authentication of its partner, thus it can withstand non-repudiation attacks. Therefore, it is suitable for electronic commerce to provide non-repudiation services. By comparing the security and computational complexity of the proposed protocol with other existing protocols in our study, we show that the proposed protocol not only satisfies all security attributes but also obtains computational efficiency with a cost of 3 point multiplications.

Original languageEnglish
Pages (from-to)1273-1284
Number of pages12
JournalInternational Journal of Innovative Computing, Information and Control
Volume7
Issue number3
StatePublished - 1 Mar 2011

Keywords

  • Cryptography
  • Elliptic curve cryptosystem
  • Extended Canetti-Krawczyk
  • Key agreement

Fingerprint Dive into the research topics of 'An efficient and secure three-pass authenticated key agreement elliptic curve based protocol'. Together they form a unique fingerprint.

  • Cite this