Cryptanalysis and improvement of an efficient two-party authentication key exchange protocol for mobile environment

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

A mobile user can access mobile service anywhere and at anytime through mobile environment. However, mobile environment can be vulnerable to potential adversary because mobile service is provided in public network. To overcome these security issue, in 2017, Qi et al. proposed an efficient two-party authentication key exchange protocol for mobile environment. However, we point out that Qi et al.'s scheme cannot resist insider attack, impersonation attack and trace attack. we also demonstrate that Qi et al.'s scheme cannot provide anonymity. In order to theses security weaknesses, we propose improved and efficient two-party authentication key exchange protocol for mobile environment using secure parameter.

Original languageEnglish
Title of host publicationInternational Conference on Electronics, Information and Communication, ICEIC 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-2
Number of pages2
ISBN (Electronic)9781538647547
DOIs
StatePublished - 2 Apr 2018
Event17th International Conference on Electronics, Information and Communication, ICEIC 2018 - Honolulu, United States
Duration: 24 Jan 201827 Jan 2018

Publication series

NameInternational Conference on Electronics, Information and Communication, ICEIC 2018
Volume2018-January

Conference

Conference17th International Conference on Electronics, Information and Communication, ICEIC 2018
Country/TerritoryUnited States
CityHonolulu
Period24/01/1827/01/18

Keywords

  • authentication
  • ECC
  • key exchange
  • mobile environment

Fingerprint

Dive into the research topics of 'Cryptanalysis and improvement of an efficient two-party authentication key exchange protocol for mobile environment'. Together they form a unique fingerprint.

Cite this