An Enhanced Certificateless Authenticated Key Agreement Protocol
Madhusudhan, R., Hegde, M., Memon, I. (2018). A dynamic authentication scheme based on elliptical cryptography, secure and improved, with smart card. International Journal of Communication Systems, 31 (11), e3701. Islam, S. H., Biswas, G. P. (2012). An identity protocol without coupling for the agreement of group keys for unbalanced mobile phone networks.
Annals of Communications, 67 (11-12), 547-558. When the client asks the server for a service, they send their signature to the server. In the cryptographic mechanism without a certificate, the user`s private key consists of two parts. The first part is the secret value chosen at random by the client and the other part is the partially private key provided by the server. The opponent cannot falsify this signature without knowing the user`s private key. Therefore, as soon as the authentication between the customer and AP is successful, AP provides services to the customer, and that customer cannot deny that he requested services from the AP and enjoyed the services. When AP receives the customer`s requirement message, it uses the session key to decipher it. Then the server can retrieve and calculate, then send it to the client to complete the authentication. Since a third party cannot access the session key, AP cannot deny that it has provided services to the user. In the registration phase of the proposed scheme, the client and the server perform mutual authentication on the customer`s formula and identity. Since the message is transmitted in the registration phase through a secure channel, only the legitimate customer has calculated the knowledge and .
AP and the server are authenticated in the same way to prevent the enemy from constantly sending junk food information to AP. In the authentication phase, only the requested access point can authenticate the accessing user by verifying the user`s signature, and AP verifies that the formula contains it. Among them is generated by the secret value and value of the haven. In addition, refers to one that can only be recovered by AP. The customer authenticates AP by the authentication code because it is bound and the session key is kept secret by the client and AP. Overall, the proposed scheme performs mutual authentication between the customer and the AP. This document is organized as follows. We discuss the corresponding work in section 2.
Section 3 briefly describes the basic definition of biinery coupling and acceptance of the HMB. Section 4 presents the system model of our authenticated key contract model for WBANs and lists several safety requirements that must be met. We describe the proposed rule for WBANs in Section 5. We will conduct the safety analysis of the proposed scheme in Section 6. Section 7 examines the cost of calculating the proposed system. In conclusion, we say in section 8. Zheng, Y. (1998). Shortened digital signature, signcryption and compact and non-fake key chords. Transmission to IEEE P1363a: standard specifications for cryptography with public keys. Heo, S., Kim, Z., Kim, K. (2007).
Authenticated group key protocol without certificate for dynamic groups. At the IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference (p. 464-468). ieee. There are certain security requirements that must be met in the draft key agreement system for the most und certificate-free WBAN . Wu, T. Y., Tseng, Y.M., Yu, C. W. (2011). Double-cost, contribution group key exchange protocol for wireless network environments.
EURASIP Journal on Wireless Communications and Networking, 2011 (1), 12.