By Topic

Efficient User Authentication and Key Establishment Protocols with Perfect Forward Secrecy for Mobile Devices

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Chin-Chen Chang ; Dept. of Inf. Eng. & Comput. Sci., Feng Chia Univ., Taichung, Taiwan ; Shih-Yi Lin ; Jen-Ho Yang

Kerberos is a well-known network authentication mechanism. Based upon Kerberos' model, Sun and Yeh proposed three user authentication and key establishment (UAKE) protocols with perfect forward secrecy (PFS). However, due to the use of public-key cryptosystem to implement UAKE, their protocols are not suitable for mobile devices, which have computational, power and storage constraints. Therefore, in this paper, we propose three UAKE protocols with PFS that are efficient and practical for mobile devices. And because our protocols are based on one-way hash functions and exclusive-or (XOR) operations, the computation loads and the power requirements are less than those in Sun and Yeh's protocols.

Published in:

Computer and Information Technology, 2009. CIT '09. Ninth IEEE International Conference on  (Volume:2 )

Date of Conference:

11-14 Oct. 2009