Privacy-preserved key agreement with user authentication

Chien Lung Hsu, Tzu Wei Lin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

With the progress of information technology, the computer crimes are emerging in an endless stream. It is because of the user's privacy should be protected, when the user submit a service request to the service provider, both of them should check the identity of the other, and then build a shared key to accomplish the service request. In this paper, we adopt the identity-based cryptosystem and the elliptic curve cryptosystem to design a privacy-preserved key agreement with user authentication. This protocol can achieve several properties: mutual authentication, deniability, and forward secrecy. Besides, the performance of the proposed protocol based on RSA is better than previous studies.

Original languageEnglish
Title of host publicationProceedings - 2015 10th Asia Joint Conference on Information Security, AsiaJCIS 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages12-17
Number of pages6
ISBN (Electronic)9781479919895
DOIs
StatePublished - 2015
Externally publishedYes
Event10th Asia Joint Conference on Information Security, AsiaJCIS 2015 - Kaohsiung City, Taiwan
Duration: 24 05 201526 05 2015

Publication series

NameProceedings - 2015 10th Asia Joint Conference on Information Security, AsiaJCIS 2015

Conference

Conference10th Asia Joint Conference on Information Security, AsiaJCIS 2015
Country/TerritoryTaiwan
CityKaohsiung City
Period24/05/1526/05/15

Bibliographical note

Publisher Copyright:
© 2015 IEEE.

Keywords

  • Elliptic curve
  • Identity-based
  • Key agreement
  • Shared key
  • User privacy

Fingerprint

Dive into the research topics of 'Privacy-preserved key agreement with user authentication'. Together they form a unique fingerprint.

Cite this