Efficient Authentication and Key Agreement Protocol with Anonymity for Delay Tolerant Networks

  • Authors:
  • Yan Ding;Xian-Wei Zhou;Zhi-Mi Cheng;Wen-Lu Zeng

  • Affiliations:
  • Department of Communication Engineering, School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, People's Republic of China 100083;Department of Communication Engineering, School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, People's Republic of China 100083;Department of Communication Engineering, School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, People's Republic of China 100083;Department of Communication Engineering, School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, People's Republic of China 100083

  • Venue:
  • Wireless Personal Communications: An International Journal
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Most of the existing authentication and key agreement protocols for delay tolerant networks are not designed for protecting privacy. In this paper, an authentication and key agreement protocol with anonymity based on combined public key is proposed. The proposed protocol eliminates the need of public key digital certificate on-line retrieval, so that any on-line trusted third party is no longer required, only needs an off-line public information repository and key generation center; and realizes mutual authentication and key agreement with anonymity between two entities. We show that the proposed protocol is secure for all probabilistic polynomial-time attackers, and achieves good security properties, including authentication, anonymity, and confidentiality and so on.