Abstract
With the progress of information technology, the computer crimes are emerging in an endless stream. It is because of the user's privacy should be protected, when the user submit a service request to the service provider, both of them should check the identity of the other, and then build a shared key to accomplish the service request. In this paper, we adopt the identity-based cryptosystem and the elliptic curve cryptosystem to design a privacy-preserved key agreement with user authentication. This protocol can achieve several properties: mutual authentication, deniability, and forward secrecy. Besides, the performance of the proposed protocol based on RSA is better than previous studies.
| Original language | English |
|---|---|
| Title of host publication | Proceedings - 2015 10th Asia Joint Conference on Information Security, AsiaJCIS 2015 |
| Publisher | Institute of Electrical and Electronics Engineers Inc. |
| Pages | 12-17 |
| Number of pages | 6 |
| ISBN (Electronic) | 9781479919895 |
| DOIs | |
| State | Published - 2015 |
| Externally published | Yes |
| Event | 10th Asia Joint Conference on Information Security, AsiaJCIS 2015 - Kaohsiung City, Taiwan Duration: 24 05 2015 → 26 05 2015 |
Publication series
| Name | Proceedings - 2015 10th Asia Joint Conference on Information Security, AsiaJCIS 2015 |
|---|
Conference
| Conference | 10th Asia Joint Conference on Information Security, AsiaJCIS 2015 |
|---|---|
| Country/Territory | Taiwan |
| City | Kaohsiung City |
| Period | 24/05/15 → 26/05/15 |
Bibliographical note
Publisher Copyright:© 2015 IEEE.
Keywords
- Elliptic curve
- Identity-based
- Key agreement
- Shared key
- User privacy