By Topic

Identity-based authenticated key exchange protocols

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Li Xiaoyong ; College of Architecture, North China University of Technology, Beijing 100144, China ; Zhang Hui

With the rapid development on electronic technology, various mobile devices are produced to make human life more convenient. With the mobile devices are portable, people can do some traditional transactions on Internet or wireless anytime and anywhere. How to make the communications security in such devices is none trivial thing than one might at first glance since some current authenticated key exchange can not suitable to be applied to mobile device Due to the computational ability and storage capacity is limited, in this paper, we propose an identity-based authenticated key exchange protocol without using bilinear pairings or Weil pairing. Compared with previous ID-based protocols, our protocols can minimize computational overload and storage space without extra message exchange time. In addition, our protocol can resist to key compromise impersonation resilience, KGS forward secrecy, no key control attacks and so on. We believe our proposed protocol can be well applied to low-power devices.

Published in:

Educational and Information Technology (ICEIT), 2010 International Conference on  (Volume:3 )

Date of Conference:

17-19 Sept. 2010