The State of Elliptic Curve Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Elliptic curves in cryptography
Elliptic curves in cryptography
Time synchronization in ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Elliptic Curve Public Key Cryptosystems
Elliptic Curve Public Key Cryptosystems
Use of Elliptic Curves in Cryptography
CRYPTO '85 Advances in Cryptology
DDH-based group key agreement in a mobile environment
Journal of Systems and Software
On the Security of Two Group Key Agreement Protocols for Mobile Devices
MDM '06 Proceedings of the 7th International Conference on Mobile Data Management
WSEAS TRANSACTIONS on COMMUNICATIONS
Smart card based solution for non-repudiation in GSM WAP applications
WSEAS Transactions on Computers
Research of utility prepayment system based on wireless communication
WSEAS TRANSACTIONS on COMMUNICATIONS
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
VSH, an efficient and provable collision-resistant hash function
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Mutual authentication and group key agreement for low-power mobile devices
Computer Communications
Hi-index | 0.00 |
In 2004, Bresson et al. proposed a mutual authentication and group key agreement protocol for unbalanced wireless networks. Tseng recently proposed a novel secure protocol to improve Bresson et al.'s protocol. However, both protocols are based on certificate-based public key systems and insecure against the so-called impersonation attacks. They might be unsuitable for unbalanced wireless mobile networks from the viewpoints of security, computational complexities, and communication overheads. This paper proposes a certificateless authenticated group key agreement (cAGKA) protocol based on elliptic curve discrete logarithms. The proposed cAGKA protocol is more secure and efficient than previously proposed protocols for unbalanced wireless mobile networks due to the following facts: (i) The entity authentication and the authenticity of the intended public keys can be simultaneously verified in a logically single step without requiring any public key certificates. (ii) Bit sizes of the keys and the related messages are relatively smaller than those of the previously proposed protocols for the same security level. (iii) It saves the required communication overheads, and computational complexities. (iv) It achieves mutual authentication, impersonation attack resistance, explicit key confirmation, forward secrecy, contributory key agreement, and group key updating.