By Topic

An Efficient Fast Authentication Protocol

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Hui Zhu ; Minist. of Educ. Key Lab. of Comput. Network & Inf. Security, Xidian Univ., Xi'an, China ; Hui Li ; Yu-min Wang

Based on symmetrical encryption and signature, an efficient authentication key agreement protocol was proposed in this paper. The security analysis of the proposed protocol in the implementation plan with the Canetti-Krawczyk model is presented. The results showed that the proposed protocol was session-key secure with perfect forward secrecy, known key security and no key compromise impersonation. Moreover, the implementation of the protocol was just twice communications, once signature and once symmetrical encryption, it could be an efficient authentication method between users in wireless network.

Published in:

Computational Intelligence and Security, 2009. CIS '09. International Conference on  (Volume:2 )

Date of Conference:

11-14 Dec. 2009