Authenticated Diffie-Hellman Key Agreement Protocols
SAC '98 Proceedings of the Selected Areas in Cryptography
Security Considerations in Space and Delay Tolerant Networks
SMC-IT '06 Proceedings of the 2nd IEEE International Conference on Space Mission Challenges for Information Technology
Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series)
Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series)
A New Key Management and Authentication Method for WSN Based on CPK
CCCM '08 Proceedings of the 2008 ISECS International Colloquium on Computing, Communication, Control, and Management - Volume 02
CPK-Based Authentication and Key Agreement Protocols with Anonymity for Wireless Network
MINES '09 Proceedings of the 2009 International Conference on Multimedia Information Networking and Security - Volume 01
An efficient anonymous authentication mechanism for delay tolerant networks
Computers and Electrical Engineering
An IBE scheme using ECC combined public key
Computers and Electrical Engineering
Practical security for disconnected nodes
NPSEC'05 Proceedings of the First international conference on Secure network protocols
Journal of Network and Computer Applications
Hi-index | 0.00 |
Most of the existing authentication and key agreement protocols for delay tolerant networks are not designed for protecting privacy. In this paper, an authentication and key agreement protocol with anonymity based on combined public key is proposed. The proposed protocol eliminates the need of public key digital certificate on-line retrieval, so that any on-line trusted third party is no longer required, only needs an off-line public information repository and key generation center; and realizes mutual authentication and key agreement with anonymity between two entities. We show that the proposed protocol is secure for all probabilistic polynomial-time attackers, and achieves good security properties, including authentication, anonymity, and confidentiality and so on.