Computer Engineering and Applications ›› 2024, Vol. 60 ›› Issue (14): 283-293.DOI: 10.3778/j.issn.1002-8331.2304-0196
• Network, Communication and Security • Previous Articles Next Articles
SONG Qing, MA Mimi, DENG Miaolei, ZUO Zhibin
Online:
2024-07-15
Published:
2024-07-15
宋庆,马米米,邓淼磊,左志斌
SONG Qing, MA Mimi, DENG Miaolei, ZUO Zhibin. Lightweight Two-Party Authentication Key Agreement Protocol[J]. Computer Engineering and Applications, 2024, 60(14): 283-293.
宋庆, 马米米, 邓淼磊, 左志斌. 轻量级的两方认证密钥协商协议[J]. 计算机工程与应用, 2024, 60(14): 283-293.
[1] KUNZ-JACQUES S, POINTCHEVAL D. About the security of MTI/C0 and MQV[C]//Proceedings of the International Conference on Security and Cryptography for Networks, 2006: 156-172. [2] LAW L, MENEZES A, QU M, et al. An efficient protocol for authenticated key agreement[J]. Designs, Codes and Cryptography, 2003, 28: 119-134. [3] KRAWCZYK H. HMQV: a high-performance secure diffie-hellman protocol[C]//Proceedings of the Annual International Cryptology Conference, 2005: 546-566. [4]YAO A C, ZHAO Y. A new family of implicitly authenticated diffie-hellman protocols[C]//Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, 2012. [5] LAUTER K, MITYAGIN A. Security analysis of KEA authenticated key exchange protocol[C]//Proceedings of the International Workshop on Public Key Cryptography, 2006: 378-394. [6] SHAMIR A. Identity-based cryptosystems and signature schemes[C]//Proceedings of the CRYDTO 84 on Advances in Cryptology, 1985: 47-53. [7] 杨毅宇, 周威, 赵尚儒, 等. 物联网安全研究综述:威胁、检测与防御[J]. 通信学报, 2021, 42(8): 188-205. YANG Y Y, ZHOU W, ZHAO S R, et al. An overview of IoT security research: threats, detection and defence[J]. Journal on Communications, 2021, 42(8): 188-205. [8] YOUNG A, YUNG M. Kleptography: using cryptography against cryptography[C]//Advances in Cryptology-EUROCRYPT’97, 1997: 62-74. [9] MIRONOV I, STEPHENS-DAVIDOWITZ N. Cryptographic reverse firewalls[C]//Advances in Cryptology-EUROCRYPT 2015, 2015: 657-686. [10] CHEN R, MU Y, YANG G, et al. Cryptographic reverse firewall via malleable smooth projective hash functions[C]//Advances in Cryptology-ASIACRYPT 2016, 2016: 844-876. [11] GROTH J. Rerandomizable and replayable adaptive chosen ciphertext attack secure cryptosystems[C]//Proceedings of the 1st Theory of Cryptography Conference, 2004: 152-170. [12] GIUSEPPE A, BERNARDO M, DANIELE V. Subversion-resilient signature schemes[C]//Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015: 364-375. [13] CHENAM V B, ALI S T. A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA[J]. Computer Standards & Interfaces, 2022, 81: 103603. [14] SHIRALY D, PAKNIAT N, NOROOZI M, et al. Pairing-free certificateless authenticated encryption with keyword search[J]. Journal of Systems Architecture, 2022, 124: 102390. [15] TURKANOVIC M, BRUMEN B, HOLBL M. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion[J]. Ad Hoc Networks, 2014, 20: 96-112. [16] FARASH M S, TURKANOVIC M, KUMARI S, et al. An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment[J]. Ad Hoc Networks, 2016, 36: 152-176. [17] GOPE P, HWANG T. A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks[J]. IEEE Transactions on Industrial Electronics, 2016, 63(11): 7124-7132. [18] ADAVOUDI-JOLFAEI A, ASHOURI-TALOUKI M, AGHILI S F. Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks[J]. Peer-to-Peer Networking and Applications, 2019, 12: 43-59. [19] DOLEV D, YAO A. On the security of public key protocols[J]. IEEE Transactions on Information Theory, 1983, 29(2): 198-208. [20] RYU J, KANG D, LEE H, et al. A secure and lightweight three-factor-based authentication scheme for smart healthcare systems[J]. Sensors, 2020, 20(24): 7136. [21] WANG S B, CAO Z F, WANG L C. Efficient certificateless authenticated key agreement protocol from pairings[J]. Wuhan University Journal of Natural Sciences, 2006, 11(5): 1278-1282. [22] HOU M, XU Q. On the security of certificateless authenticated key agreement protocol[C]//Proceedings of the IEEE International Symposium on IT in Medicine & Education, 2009: 974-979. [23] 王振宇, 郭阳, 李少青, 等. 面向轻量级物联网设备的高效匿名身份认证协议设计[J]. 通信学报, 2022, 43(7): 49-61. WANG Z Y, GUO Y, LI S Q, et al. Efficient anonymous authentication protocol design for lightweight IoT devices[J]. Journal on Communications, 2022, 43(7): 49-61. [24] KUMAR M, SAXENA P C. PF-AID-2KAP: pairing-free authenticated identity-based two-party key agreement protocol for resource-constrained devices[J]. Communications in Computer and Information Science, 2019: 425-440. [25] 刘畅, 王晋, 田里, 等. 一种适用于基于身份的认证密钥协商的逆向防火墙协议[J]. 重庆大学学报, 2022, 45(5): 21-32. LIU C, WANG J, TIAN L, et al. A reverse firewall protocol for identity-based authenticated key agreement[J]. Journal of Chongqing University (Natural Science Edition), 2022, 45(5): 21-32. [26] ZHOU Y, GUAN Y, ZHANG Z, et al. Cryptographic reverse firewalls for identity-based encryption[C]//Proceedings of the International of Conference on Foundations of Computer Science, 2019: 36-52. [27] ZHOU Y, GUO J, LI F. Certificateless public key encryption with cryptographic reverse firewalls[J]. Journal of Systems Architecture, 2020, 109: 101754. [28] WANG Y, CHEN R, HUANG X, et al. Secure anonymous communication on corrupted machines with reverse firewalls[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 19(6): 3837-3854. [29] LAMACCHIA B, LAUTER K, MITYAGIN A. Stronger security of authenticated key exchange[C]//Proceedings of the International Conference on Provable Security, 2007: 1-16. [30] BURROWS M, ABADI M, NEEDHAM R. A logic of authentication[J]. ACM Transactions on Computer Systems, 1990, 8(1): 18-36. [31] ISLAM S H, BISWAS G P. A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication[J]. Journal of King Saud University-Computer and Information Sciences, 2017, 29(1): 63-73. [32] LIU X, JIN C, LI F. An improved two-layer authentication scheme for wireless body area networks[J]. Journal of Medical Systems, 2018, 42: 1-14. [33] ODELU V, DAS A K, GOSWAMI A. A secure biometrics-based multi-server authentication protocol using smart cards[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(9): 1953-1966. |
[1] | DOU Zhi, GAO Haoran, LIU Guoqi, CHANG Baofang. Small Sample Steel Plate Defect Detection Algorithm of Lightweight YOLOv8 [J]. Computer Engineering and Applications, 2024, 60(9): 90-100. |
[2] | CAI Teng, CHEN Cifa, DONG Fangmin. Low-Light Object Detection Combining Transformer and Dynamic Feature Fusion [J]. Computer Engineering and Applications, 2024, 60(9): 135-141. |
[3] | CAO Ganggang, WANG Banghai, SONG Yu. Cross-Modal Re-Identification Light Weight Network Combined with Data Enhancement [J]. Computer Engineering and Applications, 2024, 60(8): 131-139. |
[4] | YIN Min, JIA Xinchun, ZHANG Xueli, FENG Jiangtao, FAN Xiaoyu. Human Detection of Damage Behavior for Vending Cabinets Based on Improved YOLOv4-Tiny [J]. Computer Engineering and Applications, 2024, 60(8): 234-241. |
[5] | HU Weichao, GUO Yuyang, ZHANG Qi, CHEN Yanyan. Lightweight Traffic Monitoring Object Detection Algorithm Based on Improved YOLOX [J]. Computer Engineering and Applications, 2024, 60(7): 167-174. |
[6] | LAI Jing’an, CHEN Ziqiang, SUN Zongwei, PEI Qingqi. Lightweight Foggy Weather Object Detection Method Based on YOLOv5 [J]. Computer Engineering and Applications, 2024, 60(6): 78-88. |
[7] | QU Haicheng, YUAN Xudong, LI Jiaqi. Lightweight Object Detection Method for Constrained Environments [J]. Computer Engineering and Applications, 2024, 60(6): 274-281. |
[8] | JIN Yuyao, ZHANG Xiaomei, WANG Yajie. Multi-Scene Continuous Authentication Based on Attention Module for Mobile Devices [J]. Computer Engineering and Applications, 2024, 60(3): 280-291. |
[9] | XIN Shi’ao, GE Haibo, YUAN Hao, YANG Yudi , YAO Yang. Improved Lightweight Underwater Target Detection Algorithm of YOLOv7 [J]. Computer Engineering and Applications, 2024, 60(3): 88-99. |
[10] | LIU Jin, LUO Xiaoshu, XU Zhaoxing. Weight Inference and Label Smoothing for Lightweight Facial Expression Recognition [J]. Computer Engineering and Applications, 2024, 60(2): 254-263. |
[11] | GE Zekun, TAO Fazhan, FU Zhumu, SONG Shuzhong. Lane Detection Method Based on Improved Multi-Head Self-Attention [J]. Computer Engineering and Applications, 2024, 60(2): 264-271. |
[12] | ZHANG Mingquan, YANG Tian, DUO Chunhong. Access Authentication Method of Power Distribution Internet of Things Based on Improved PBFT [J]. Computer Engineering and Applications, 2024, 60(2): 279-287. |
[13] | NIU Wentao, WANG Peng, CHEN Zuntian, LI Xiaoyan, GAO Hui, SUN Mengyu. Feature Fusion Target Detection Algorithm Using Dynamic Sample Assignment [J]. Computer Engineering and Applications, 2024, 60(15): 211-220. |
[14] | DONG Yanqiang, CHENG Deqiang, ZHANG Yunhe, KOU Qiqi, ZHANG Haoxiang. Lightweight Coal Mine Safety Helmet Detection Method Based on Attention and Reconfiguration Feature Fusion [J]. Computer Engineering and Applications, 2024, 60(15): 297-306. |
[15] | LI Ming, DANG Qingxia. Lightweight Face Recognition Algorithm Combining Transformer and CNN [J]. Computer Engineering and Applications, 2024, 60(14): 96-104. |
Viewed | ||||||||||||||||||||||||||||||||||||||||||||||
Full text 38
|
|
|||||||||||||||||||||||||||||||||||||||||||||
Abstract 43
|
|
|||||||||||||||||||||||||||||||||||||||||||||