Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function

The authenticated multiple-key agreement protocol provides two entities to authenticate each other and establish multiple common keys in a two-pass interaction, a protocol without using a conventional hash function simplifies its security assumption on only public hard problem. In 2004, Chien and Ja...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Huang, Huifeng, Chang, Chinchen
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 559
container_issue
container_start_page 554
container_title
container_volume
creator Huang, Huifeng
Chang, Chinchen
description The authenticated multiple-key agreement protocol provides two entities to authenticate each other and establish multiple common keys in a two-pass interaction, a protocol without using a conventional hash function simplifies its security assumption on only public hard problem. In 2004, Chien and Jan proposed an authenticated multiple-key agreement protocol to overcome the shortcomings that break the previous variants. This paper shows that Chien and Jan’s scheme has a weakness that is vulnerable to forgery. To remedy this weakness, we improve Chien and Jan’s scheme such that the newly improved scheme has authenticated property and does not significantly affect the efficiency of the original scheme. Compared to the previous schemes, our improved method also achieves better key utilization.
doi_str_mv 10.1007/11596981_82
format Conference Proceeding
fullrecord <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_17394958</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>17394958</sourcerecordid><originalsourceid>FETCH-LOGICAL-p219t-34403ed52a49be7cb104acbf3060d28260e201be936a58ef8362e59f7543cc853</originalsourceid><addsrcrecordid>eNpNUD1PwzAQNV8SpXTiD3hhYAj4O_ZYVS0gispA1TFyXKcNTe0odpD673EpA7fc3XvvTncPgDuMHjFC-RPGXAklcSHJGbihnCGaEMnPwQALjDNKmboAI5XLXw5JrPglGKSKZCpn9BqMQvhCKZgiTIgB2E3dVjtj99ZF6CuoHRz3cZu62uho1_C9b2LdNjZ7swc43nT2JP3ofPTGN3BVx63vI1yG2m3gxLvv46x3uoELZ7OVPsBZ78wRugVXlW6CHf3lIVjOpp-Tl2y-eH6djOdZS7CKGWXpdLvmRDNV2tyUGDFtyooigdZEEoEsQbi0igrNpa0kFcRyVeWcUWMkp0Nwf9rb6mB0U3XpwToUbVfvdXcocE4VU1wm3cNJFxLlNrYrSu93ocCoOLpd_HOb_gBgVGz9</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function</title><source>Springer Books</source><creator>Huang, Huifeng ; Chang, Chinchen</creator><contributor>Jiao, Licheng ; Ma, Jianfeng ; Cheung, Yiu-ming ; Jiao, Yong-Chang ; Yin, Hujun ; Hao, Yue ; Liu, Jiming ; Wang, Yu-Ping</contributor><creatorcontrib>Huang, Huifeng ; Chang, Chinchen ; Jiao, Licheng ; Ma, Jianfeng ; Cheung, Yiu-ming ; Jiao, Yong-Chang ; Yin, Hujun ; Hao, Yue ; Liu, Jiming ; Wang, Yu-Ping</creatorcontrib><description>The authenticated multiple-key agreement protocol provides two entities to authenticate each other and establish multiple common keys in a two-pass interaction, a protocol without using a conventional hash function simplifies its security assumption on only public hard problem. In 2004, Chien and Jan proposed an authenticated multiple-key agreement protocol to overcome the shortcomings that break the previous variants. This paper shows that Chien and Jan’s scheme has a weakness that is vulnerable to forgery. To remedy this weakness, we improve Chien and Jan’s scheme such that the newly improved scheme has authenticated property and does not significantly affect the efficiency of the original scheme. Compared to the previous schemes, our improved method also achieves better key utilization.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540308195</identifier><identifier>ISBN: 3540308199</identifier><identifier>ISBN: 3540308180</identifier><identifier>ISBN: 9783540308188</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 3540315985</identifier><identifier>EISBN: 9783540315988</identifier><identifier>DOI: 10.1007/11596981_82</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Artificial intelligence ; Computer science; control theory; systems ; Exact sciences and technology</subject><ispartof>Computational Intelligence and Security, 2005, p.554-559</ispartof><rights>Springer-Verlag Berlin Heidelberg 2005</rights><rights>2006 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11596981_82$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11596981_82$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,779,780,784,789,790,793,4050,4051,27925,38255,41442,42511</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=17394958$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Jiao, Licheng</contributor><contributor>Ma, Jianfeng</contributor><contributor>Cheung, Yiu-ming</contributor><contributor>Jiao, Yong-Chang</contributor><contributor>Yin, Hujun</contributor><contributor>Hao, Yue</contributor><contributor>Liu, Jiming</contributor><contributor>Wang, Yu-Ping</contributor><creatorcontrib>Huang, Huifeng</creatorcontrib><creatorcontrib>Chang, Chinchen</creatorcontrib><title>Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function</title><title>Computational Intelligence and Security</title><description>The authenticated multiple-key agreement protocol provides two entities to authenticate each other and establish multiple common keys in a two-pass interaction, a protocol without using a conventional hash function simplifies its security assumption on only public hard problem. In 2004, Chien and Jan proposed an authenticated multiple-key agreement protocol to overcome the shortcomings that break the previous variants. This paper shows that Chien and Jan’s scheme has a weakness that is vulnerable to forgery. To remedy this weakness, we improve Chien and Jan’s scheme such that the newly improved scheme has authenticated property and does not significantly affect the efficiency of the original scheme. Compared to the previous schemes, our improved method also achieves better key utilization.</description><subject>Applied sciences</subject><subject>Artificial intelligence</subject><subject>Computer science; control theory; systems</subject><subject>Exact sciences and technology</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540308195</isbn><isbn>3540308199</isbn><isbn>3540308180</isbn><isbn>9783540308188</isbn><isbn>3540315985</isbn><isbn>9783540315988</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2005</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpNUD1PwzAQNV8SpXTiD3hhYAj4O_ZYVS0gispA1TFyXKcNTe0odpD673EpA7fc3XvvTncPgDuMHjFC-RPGXAklcSHJGbihnCGaEMnPwQALjDNKmboAI5XLXw5JrPglGKSKZCpn9BqMQvhCKZgiTIgB2E3dVjtj99ZF6CuoHRz3cZu62uho1_C9b2LdNjZ7swc43nT2JP3ofPTGN3BVx63vI1yG2m3gxLvv46x3uoELZ7OVPsBZ78wRugVXlW6CHf3lIVjOpp-Tl2y-eH6djOdZS7CKGWXpdLvmRDNV2tyUGDFtyooigdZEEoEsQbi0igrNpa0kFcRyVeWcUWMkp0Nwf9rb6mB0U3XpwToUbVfvdXcocE4VU1wm3cNJFxLlNrYrSu93ocCoOLpd_HOb_gBgVGz9</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>Huang, Huifeng</creator><creator>Chang, Chinchen</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2005</creationdate><title>Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function</title><author>Huang, Huifeng ; Chang, Chinchen</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p219t-34403ed52a49be7cb104acbf3060d28260e201be936a58ef8362e59f7543cc853</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Applied sciences</topic><topic>Artificial intelligence</topic><topic>Computer science; control theory; systems</topic><topic>Exact sciences and technology</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Huang, Huifeng</creatorcontrib><creatorcontrib>Chang, Chinchen</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Huang, Huifeng</au><au>Chang, Chinchen</au><au>Jiao, Licheng</au><au>Ma, Jianfeng</au><au>Cheung, Yiu-ming</au><au>Jiao, Yong-Chang</au><au>Yin, Hujun</au><au>Hao, Yue</au><au>Liu, Jiming</au><au>Wang, Yu-Ping</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function</atitle><btitle>Computational Intelligence and Security</btitle><date>2005</date><risdate>2005</risdate><spage>554</spage><epage>559</epage><pages>554-559</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540308195</isbn><isbn>3540308199</isbn><isbn>3540308180</isbn><isbn>9783540308188</isbn><eisbn>3540315985</eisbn><eisbn>9783540315988</eisbn><abstract>The authenticated multiple-key agreement protocol provides two entities to authenticate each other and establish multiple common keys in a two-pass interaction, a protocol without using a conventional hash function simplifies its security assumption on only public hard problem. In 2004, Chien and Jan proposed an authenticated multiple-key agreement protocol to overcome the shortcomings that break the previous variants. This paper shows that Chien and Jan’s scheme has a weakness that is vulnerable to forgery. To remedy this weakness, we improve Chien and Jan’s scheme such that the newly improved scheme has authenticated property and does not significantly affect the efficiency of the original scheme. Compared to the previous schemes, our improved method also achieves better key utilization.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11596981_82</doi><tpages>6</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Computational Intelligence and Security, 2005, p.554-559
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_17394958
source Springer Books
subjects Applied sciences
Artificial intelligence
Computer science
control theory
systems
Exact sciences and technology
title Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-03T20%3A39%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Enhancement%20of%20an%20Authenticated%20Multiple-Key%20Agreement%20Protocol%20Without%20Using%20Conventional%20One-Way%20Function&rft.btitle=Computational%20Intelligence%20and%20Security&rft.au=Huang,%20Huifeng&rft.date=2005&rft.spage=554&rft.epage=559&rft.pages=554-559&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540308195&rft.isbn_list=3540308199&rft.isbn_list=3540308180&rft.isbn_list=9783540308188&rft_id=info:doi/10.1007/11596981_82&rft_dat=%3Cpascalfrancis_sprin%3E17394958%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540315985&rft.eisbn_list=9783540315988&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true