About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Cloud Computing, Security, Privacy in New Computing Environments. 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings

Research Article

Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks

Download(Requires a free EAI acccount)
234 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-319-69605-8_19,
        author={Run-hua Shi and Shun Zhang},
        title={Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks},
        proceedings={Cloud Computing, Security, Privacy in New Computing Environments. 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25--26, and December 15--16, 2016, Proceedings},
        proceedings_a={CLOUDCOMP},
        year={2017},
        month={11},
        keywords={Elliptic curve cryptography Authentication Key exchange Client-server network},
        doi={10.1007/978-3-319-69605-8_19}
    }
    
  • Run-hua Shi
    Shun Zhang
    Year: 2017
    Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks
    CLOUDCOMP
    Springer
    DOI: 10.1007/978-3-319-69605-8_19
Run-hua Shi1,*, Shun Zhang1,*
  • 1: Anhui University
*Contact email: shirh@ahu.edu.cn, shzhang27@163.com

Abstract

For secure communications in mobile communication networks, various authenticated key exchange schemes are proposed to provide the remote client authentication and the session key establishment. In these schemes, more considerations are to reduce the costs of remote mobile clients, but not those of the server. However, the server has become a bottleneck in large-scale mobile communication networks. In this paper, in order to relieve the server’s load, we presented an efficient authentication protocol with key exchange between the remote client and the server, and then generalized it to a three-party case, in which two remote clients can authenticate each other with the server’s help and share a secure session key. Compared with the relevant protocols, the proposed protocols require lower computation and communication costs, and above all, dramatically reduce those of the server. Therefore, the proposed protocols are more practical and suitable for large-scale mobile communication networks.

Keywords
Elliptic curve cryptography Authentication Key exchange Client-server network
Published
2017-11-23
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-319-69605-8_19
Copyright © 2016–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL