Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Identity-based group key exchange protocol for unbalanced network environment
YUAN Simin, MA Chuangui, XIANG Shengqi
Journal of Computer Applications    2015, 35 (5): 1399-1405.   DOI: 10.11772/j.issn.1001-9081.2015.05.1399
Abstract390)      PDF (1048KB)(537)       Save

In consideration of the unbalanced wireless network whose participants have unbalanced computing power, the article analyed the security of the IDentity-based Authenticated Group Key Agreement (ID-AGKA) protocol, and pointed out that the protocol could not resist the ephemeral key leakage attack. Then because the generation of the agreement signature was improved, the safety was improved, the computational cost and communication cost was reduced effectively, so the improved protocol was more suitable for the unbalanced wireless network. Meanwhile, the protocol used a designated verifier signature, which could effectively solve the privacy problem of the signer. Moreover, in this article, the dynamic mechanism of unbalanced network group key agreement protocol was improved by powerful node making full use of the low-power nodes' computation information before users join or leave. This improvement could greatly reduce the unnecessary computation of the low-power nodes, making the new protocol more conform the actual needs. Finally, the safety of the improved Group Key Agreement (GKA) protocol was proved based on Divisible Decisional Diffie-Hellman (DDDH) assumption in the random oracle model.

Reference | Related Articles | Metrics
Provably-secure two-factor authentication scheme for wireless sensor network
CHEN Lei, WEI Fushan, MA Chuangui
Journal of Computer Applications    2015, 35 (10): 2877-2882.   DOI: 10.11772/j.issn.1001-9081.2015.10.2877
Abstract464)      PDF (1108KB)(469)       Save
With the development of Wireless Sensor Network (WSN), user authentication in WSN is a critical security issue due to their unattended and hostile deployment in the field. To improve the security of user authentication, a new provably-secure two-factor authentication key exchange scheme based on Nam's first security model was proposed. The proposed scheme was based on elliptic curve cryptography, and it achieved authentication security and user anonymity. The safety of the improved protocol was proved based on ECCDH in the random oracle model. Performance analysis demonstrates that compared to Nam's schemes, the proposal is more efficient, and it is more suited to wireless sensor networks environments.
Reference | Related Articles | Metrics