On the design of provably secure identity-based authentication and key exchange protocol for heterogeneous wireless access

  • Authors:
  • Jun Jiang;Chen He;Ling-ge Jiang

  • Affiliations:
  • Institute of Modern Communications, Shanghai Jiaotong Univ., Shanghai, China;Institute of Modern Communications, Shanghai Jiaotong Univ., Shanghai, China;Institute of Modern Communications, Shanghai Jiaotong Univ., Shanghai, China

  • Venue:
  • ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Heavily based on the provable security model of Canetti and Krawczyk (CK-model), an identity-based authentication and key exchange (AKE) protocol which uses pairings is proposed for securing heterogeneous wireless access in this paper. By using the CK-model approach, an ideal and secure key exchange protocol was first proposed. Then a full-fledged authenticator is built to provide authentication of the ideal protocol. This completes a practical AKE protocol for heterogeneous environment while carrying the security proof. Analysis shows that our protocol is secure with partial forward secrecy, and efficient for considering the asymmetric wireless environment.