Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function
The authenticated multiple-key agreement protocol provides two entities to authenticate each other and establish multiple common keys in a two-pass interaction, a protocol without using a conventional hash function simplifies its security assumption on only public hard problem. In 2004, Chien and Ja...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 559 |
---|---|
container_issue | |
container_start_page | 554 |
container_title | |
container_volume | |
creator | Huang, Huifeng Chang, Chinchen |
description | The authenticated multiple-key agreement protocol provides two entities to authenticate each other and establish multiple common keys in a two-pass interaction, a protocol without using a conventional hash function simplifies its security assumption on only public hard problem. In 2004, Chien and Jan proposed an authenticated multiple-key agreement protocol to overcome the shortcomings that break the previous variants. This paper shows that Chien and Jan’s scheme has a weakness that is vulnerable to forgery. To remedy this weakness, we improve Chien and Jan’s scheme such that the newly improved scheme has authenticated property and does not significantly affect the efficiency of the original scheme. Compared to the previous schemes, our improved method also achieves better key utilization. |
doi_str_mv | 10.1007/11596981_82 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_17394958</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>17394958</sourcerecordid><originalsourceid>FETCH-LOGICAL-p219t-34403ed52a49be7cb104acbf3060d28260e201be936a58ef8362e59f7543cc853</originalsourceid><addsrcrecordid>eNpNUD1PwzAQNV8SpXTiD3hhYAj4O_ZYVS0gispA1TFyXKcNTe0odpD673EpA7fc3XvvTncPgDuMHjFC-RPGXAklcSHJGbihnCGaEMnPwQALjDNKmboAI5XLXw5JrPglGKSKZCpn9BqMQvhCKZgiTIgB2E3dVjtj99ZF6CuoHRz3cZu62uho1_C9b2LdNjZ7swc43nT2JP3ofPTGN3BVx63vI1yG2m3gxLvv46x3uoELZ7OVPsBZ78wRugVXlW6CHf3lIVjOpp-Tl2y-eH6djOdZS7CKGWXpdLvmRDNV2tyUGDFtyooigdZEEoEsQbi0igrNpa0kFcRyVeWcUWMkp0Nwf9rb6mB0U3XpwToUbVfvdXcocE4VU1wm3cNJFxLlNrYrSu93ocCoOLpd_HOb_gBgVGz9</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function</title><source>Springer Books</source><creator>Huang, Huifeng ; Chang, Chinchen</creator><contributor>Jiao, Licheng ; Ma, Jianfeng ; Cheung, Yiu-ming ; Jiao, Yong-Chang ; Yin, Hujun ; Hao, Yue ; Liu, Jiming ; Wang, Yu-Ping</contributor><creatorcontrib>Huang, Huifeng ; Chang, Chinchen ; Jiao, Licheng ; Ma, Jianfeng ; Cheung, Yiu-ming ; Jiao, Yong-Chang ; Yin, Hujun ; Hao, Yue ; Liu, Jiming ; Wang, Yu-Ping</creatorcontrib><description>The authenticated multiple-key agreement protocol provides two entities to authenticate each other and establish multiple common keys in a two-pass interaction, a protocol without using a conventional hash function simplifies its security assumption on only public hard problem. In 2004, Chien and Jan proposed an authenticated multiple-key agreement protocol to overcome the shortcomings that break the previous variants. This paper shows that Chien and Jan’s scheme has a weakness that is vulnerable to forgery. To remedy this weakness, we improve Chien and Jan’s scheme such that the newly improved scheme has authenticated property and does not significantly affect the efficiency of the original scheme. Compared to the previous schemes, our improved method also achieves better key utilization.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540308195</identifier><identifier>ISBN: 3540308199</identifier><identifier>ISBN: 3540308180</identifier><identifier>ISBN: 9783540308188</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 3540315985</identifier><identifier>EISBN: 9783540315988</identifier><identifier>DOI: 10.1007/11596981_82</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Artificial intelligence ; Computer science; control theory; systems ; Exact sciences and technology</subject><ispartof>Computational Intelligence and Security, 2005, p.554-559</ispartof><rights>Springer-Verlag Berlin Heidelberg 2005</rights><rights>2006 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11596981_82$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11596981_82$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,779,780,784,789,790,793,4050,4051,27925,38255,41442,42511</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=17394958$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Jiao, Licheng</contributor><contributor>Ma, Jianfeng</contributor><contributor>Cheung, Yiu-ming</contributor><contributor>Jiao, Yong-Chang</contributor><contributor>Yin, Hujun</contributor><contributor>Hao, Yue</contributor><contributor>Liu, Jiming</contributor><contributor>Wang, Yu-Ping</contributor><creatorcontrib>Huang, Huifeng</creatorcontrib><creatorcontrib>Chang, Chinchen</creatorcontrib><title>Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function</title><title>Computational Intelligence and Security</title><description>The authenticated multiple-key agreement protocol provides two entities to authenticate each other and establish multiple common keys in a two-pass interaction, a protocol without using a conventional hash function simplifies its security assumption on only public hard problem. In 2004, Chien and Jan proposed an authenticated multiple-key agreement protocol to overcome the shortcomings that break the previous variants. This paper shows that Chien and Jan’s scheme has a weakness that is vulnerable to forgery. To remedy this weakness, we improve Chien and Jan’s scheme such that the newly improved scheme has authenticated property and does not significantly affect the efficiency of the original scheme. Compared to the previous schemes, our improved method also achieves better key utilization.</description><subject>Applied sciences</subject><subject>Artificial intelligence</subject><subject>Computer science; control theory; systems</subject><subject>Exact sciences and technology</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540308195</isbn><isbn>3540308199</isbn><isbn>3540308180</isbn><isbn>9783540308188</isbn><isbn>3540315985</isbn><isbn>9783540315988</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2005</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpNUD1PwzAQNV8SpXTiD3hhYAj4O_ZYVS0gispA1TFyXKcNTe0odpD673EpA7fc3XvvTncPgDuMHjFC-RPGXAklcSHJGbihnCGaEMnPwQALjDNKmboAI5XLXw5JrPglGKSKZCpn9BqMQvhCKZgiTIgB2E3dVjtj99ZF6CuoHRz3cZu62uho1_C9b2LdNjZ7swc43nT2JP3ofPTGN3BVx63vI1yG2m3gxLvv46x3uoELZ7OVPsBZ78wRugVXlW6CHf3lIVjOpp-Tl2y-eH6djOdZS7CKGWXpdLvmRDNV2tyUGDFtyooigdZEEoEsQbi0igrNpa0kFcRyVeWcUWMkp0Nwf9rb6mB0U3XpwToUbVfvdXcocE4VU1wm3cNJFxLlNrYrSu93ocCoOLpd_HOb_gBgVGz9</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>Huang, Huifeng</creator><creator>Chang, Chinchen</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2005</creationdate><title>Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function</title><author>Huang, Huifeng ; Chang, Chinchen</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p219t-34403ed52a49be7cb104acbf3060d28260e201be936a58ef8362e59f7543cc853</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Applied sciences</topic><topic>Artificial intelligence</topic><topic>Computer science; control theory; systems</topic><topic>Exact sciences and technology</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Huang, Huifeng</creatorcontrib><creatorcontrib>Chang, Chinchen</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Huang, Huifeng</au><au>Chang, Chinchen</au><au>Jiao, Licheng</au><au>Ma, Jianfeng</au><au>Cheung, Yiu-ming</au><au>Jiao, Yong-Chang</au><au>Yin, Hujun</au><au>Hao, Yue</au><au>Liu, Jiming</au><au>Wang, Yu-Ping</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function</atitle><btitle>Computational Intelligence and Security</btitle><date>2005</date><risdate>2005</risdate><spage>554</spage><epage>559</epage><pages>554-559</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540308195</isbn><isbn>3540308199</isbn><isbn>3540308180</isbn><isbn>9783540308188</isbn><eisbn>3540315985</eisbn><eisbn>9783540315988</eisbn><abstract>The authenticated multiple-key agreement protocol provides two entities to authenticate each other and establish multiple common keys in a two-pass interaction, a protocol without using a conventional hash function simplifies its security assumption on only public hard problem. In 2004, Chien and Jan proposed an authenticated multiple-key agreement protocol to overcome the shortcomings that break the previous variants. This paper shows that Chien and Jan’s scheme has a weakness that is vulnerable to forgery. To remedy this weakness, we improve Chien and Jan’s scheme such that the newly improved scheme has authenticated property and does not significantly affect the efficiency of the original scheme. Compared to the previous schemes, our improved method also achieves better key utilization.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11596981_82</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Computational Intelligence and Security, 2005, p.554-559 |
issn | 0302-9743 1611-3349 |
language | eng |
recordid | cdi_pascalfrancis_primary_17394958 |
source | Springer Books |
subjects | Applied sciences Artificial intelligence Computer science control theory systems Exact sciences and technology |
title | Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-03T20%3A39%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Enhancement%20of%20an%20Authenticated%20Multiple-Key%20Agreement%20Protocol%20Without%20Using%20Conventional%20One-Way%20Function&rft.btitle=Computational%20Intelligence%20and%20Security&rft.au=Huang,%20Huifeng&rft.date=2005&rft.spage=554&rft.epage=559&rft.pages=554-559&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540308195&rft.isbn_list=3540308199&rft.isbn_list=3540308180&rft.isbn_list=9783540308188&rft_id=info:doi/10.1007/11596981_82&rft_dat=%3Cpascalfrancis_sprin%3E17394958%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540315985&rft.eisbn_list=9783540315988&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |