Affiliation:
1. Shanghai Key Laboratory of Contemporary Optics System, College of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai 200093, China
Abstract
With the development of wireless technology, people increasingly rely on mobile devices. Since most mobile devices transmit sensitive information via insecure public channels, it is important to design multiauthentication key agreement protocols for security protection. Traditional scholars tend to use traditional public-key cryptosystems (PKCs) in their protocols to improve security. High-cost operations (e.g., elliptic curve point multiplication and bilinear pairing) were widely used in their scheme but were not suitable for mobile devices because of limited computing resources. In this study, we designed a novel high-efficiency multiauthentication and key agreement protocol and demonstrate its security in the random oracle model. Compared with other protocols, our proposed scheme only uses string concatenation operations, one-way hash functions, and XOR operations. In addition, our protocol requires much fewer computing resources to achieve the same level of security.
Funder
National Key Foundation for Exploring Scientific Instrument of China
Subject
Computer Networks and Communications,Information Systems
Reference40 articles.
1. Smishing and the rise of mobile banking attacks;A. Fabio,2021
2. Use of elliptic curves in cryptography;V. S. Miller
3. Elliptic curve cryptosystems
4. Fast implementations of RSA cryptography;M. Shand
5. On the security of ElGamal based encryption;Y. Tsiounis