Handbook of Applied Cryptography
Handbook of Applied Cryptography
EC2C-PAKA: An efficient client-to-client password-authenticated key agreement
Information Sciences: an International Journal
Security proofs for signature schemes
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Constant-Round password-based group key generation for multi-layer ad-hoc networks
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Hi-index | 0.00 |
A password-authenticated key agreement scheme based on Elliptic Curves Cryptography (ECC) for Ad hoc networks is presented. The scheme is composed of system initialization, identity-based (ID-based) password evolvement algorithm, identity authentication algorithm and session keys generation algorithm. The freshness and security of password are guaranteed by the sharing password evolvement mechanism every time in node's identity authentication. The self-certified key is used in the scheme to guarantee the reliability of the node' s identity and reduce requirement for data storage and traffic. The scheme combines password authentication with public key authentication and enjoys many secure properties such as forward security, backward security, key independence, etc. So that it can resist types of attack. The computation complexity and the communication overhead of the scheme are low. The scheme is independent of any group controller and is suitable for ad hoc networks.