Abstract
|
Article Information:
Mutual-anonymity and Authentication Key Agreement Protocol
Tao Feng, Chuang Zou, Chunyan Liu and Zheng Hao
Corresponding Author: Tao Feng
Submitted: April 08, 2013
Accepted: May 03, 2013
Published: September 01, 2013 |
Abstract:
|
According to the characteristics of trusted computation, we proposed an efficient pseudonym ring signature-based authentication and key agreement protocol with mutual anonymity. The use of ring signature can hide the identity information of communicating parties and effectively prevent the leakage of private information. Finally we derive a shared session key between them for their future secure communication especially in the trusted computation environment. Our protocol reaches the level of universally composable security and is more efficient.
Key words: Anonymity, authentication and key agreement, ring signature, trusted computation, universally composable, ,
|
Abstract
|
PDF
|
HTML |
|
Cite this Reference:
Tao Feng, Chuang Zou, Chunyan Liu and Zheng Hao, . Mutual-anonymity and Authentication Key Agreement Protocol. Research Journal of Information Technology , (3): 81-86.
|
|
|
|
|
ISSN (Online): 2041-3114
ISSN (Print): 2041-3106 |
|
Information |
|
|
|
Sales & Services |
|
|
|