Cloud Computing, Security, Privacy in New Computing Environments. 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings

Research Article

Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks

Download
173 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-69605-8_19,
        author={Run-hua Shi and Shun Zhang},
        title={Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks},
        proceedings={Cloud Computing, Security, Privacy in New Computing Environments. 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25--26, and December 15--16, 2016, Proceedings},
        proceedings_a={CLOUDCOMP},
        year={2017},
        month={11},
        keywords={Elliptic curve cryptography Authentication Key exchange Client-server network},
        doi={10.1007/978-3-319-69605-8_19}
    }
    
  • Run-hua Shi
    Shun Zhang
    Year: 2017
    Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks
    CLOUDCOMP
    Springer
    DOI: 10.1007/978-3-319-69605-8_19
Run-hua Shi1,*, Shun Zhang1,*
  • 1: Anhui University
*Contact email: shirh@ahu.edu.cn, shzhang27@163.com

Abstract

For secure communications in mobile communication networks, various authenticated key exchange schemes are proposed to provide the remote client authentication and the session key establishment. In these schemes, more considerations are to reduce the costs of remote mobile clients, but not those of the server. However, the server has become a bottleneck in large-scale mobile communication networks. In this paper, in order to relieve the server’s load, we presented an efficient authentication protocol with key exchange between the remote client and the server, and then generalized it to a three-party case, in which two remote clients can authenticate each other with the server’s help and share a secure session key. Compared with the relevant protocols, the proposed protocols require lower computation and communication costs, and above all, dramatically reduce those of the server. Therefore, the proposed protocols are more practical and suitable for large-scale mobile communication networks.