Home           Contact us           FAQs           
   Journal Page   |   Aims & Scope   |   Author Guideline   |   Editorial Board   |   Search
2013 (Vol. 5, Issue: 3)
Article Information:

Mutual-anonymity and Authentication Key Agreement Protocol

Tao Feng, Chuang Zou, Chunyan Liu and Zheng Hao
Corresponding Author:  Tao Feng 

Key words:  Anonymity, authentication and key agreement, ring signature, trusted computation, universally composable, ,
Vol. 5 , (3): 81-86
Submitted Accepted Published
April 08, 2013 May 03, 2013 September 01, 2013

According to the characteristics of trusted computation, we proposed an efficient pseudonym ring signature-based authentication and key agreement protocol with mutual anonymity. The use of ring signature can hide the identity information of communicating parties and effectively prevent the leakage of private information. Finally we derive a shared session key between them for their future secure communication especially in the trusted computation environment. Our protocol reaches the level of universally composable security and is more efficient.
Abstract PDF HTML
  Cite this Reference:
Tao Feng, Chuang Zou, Chunyan Liu and Zheng Hao, 2013. Mutual-anonymity and Authentication Key Agreement Protocol.  Research Journal of Information Technology , 5(3): 81-86.
    Advertise with us
ISSN (Online):  2041-3114
ISSN (Print):   2041-3106
Submit Manuscript
   Current Information
   Sales & Services
   Contact Information
  Executive Managing Editor
  Email: admin@maxwellsci.com
  Publishing Editor
  Email: support@maxwellsci.com
  Account Manager
  Email: faisalm@maxwellsci.com
  Journal Editor
  Email: admin@maxwellsci.com
  Press Department
  Email: press@maxwellsci.com
Home  |  Contact us  |  About us  |  Privacy Policy
Copyright © 2009. MAXWELL Science Publication, a division of MAXWELLl Scientific Organization. All rights reserved