logo

SCIENCE CHINA Information Sciences, Volume 64 , Issue 9 : 199106(2021) https://doi.org/10.1007/s11432-019-2645-x

An enhanced key exchange protocol exhibiting key compromise impersonation attacks resistance in mobile commerce environment

More info
  • ReceivedMay 3, 2019
  • AcceptedSep 9, 2019
  • PublishedMay 24, 2021

Abstract

There is no abstract available for this article.


Acknowledgment

This work was supported by National Natural Science Foundation of China (Grant Nos. U1708262, U1736203, 61872449).


References

[1] Islam S K H, Amin R, Biswas G P. An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments. J King Saud University - Comput Inf Sci, 2017, 29: 311-324 CrossRef Google Scholar

[2] - Z T. An Improvement on A Three-Party Authentication Key Exchange Protocol Using Elliptic Curve Cryptography. JCIT, 2010, 5: 120-129 CrossRef Google Scholar

[3] Wei W, Chen J, Li D. Partially known information attack on SM2 key exchange protocol. Sci China Inf Sci, 2019, 62: 32105 CrossRef Google Scholar

[4] Yoon E J, Yoo K Y. Robust biometric-based three-party authenticated key establishment protocols. Int J Comput Math, 2011, 88: 1144-1157 CrossRef Google Scholar

[5] Islam S H. Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps. Inf Sci, 2015, 312: 104-130 CrossRef Google Scholar

[6] Arshad H, Rasoolzadegan A. Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems.. J Med Syst, 2016, 40: 237 CrossRef PubMed Google Scholar

[7] Ostad-Sharif A, Abbasinezhad-Mood D, Nikooghadam M. A Robust and Efficient ECC-based Mutual Authentication and Session Key Generation Scheme for Healthcare Applications.. J Med Syst, 2019, 43: 10 CrossRef PubMed Google Scholar

[8] Wang D, Cheng H, He D. On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices. IEEE Syst J, 2018, 12: 916-925 CrossRef Google Scholar

[9] Liu X X, Li Y P, Qu J, et al. MAKA: provably secure multi-factor authenticated key agreement protocol. Journal of Internet Technology, 2018, 19: 669-677 DOI 10.3966/160792642018051903005. Google Scholar

qqqq

Contact and support