220 likes | 332 Views
Three-Party Authenticated Key Agreements and Its Applications- PCSs Roaming Protocol. 李添福 (Tian-Fu Lee) 國立成功大學資訊工程博士 Cryptography/ Network security/ Wireless networks communication/ Algorithmic graph theory/ Database and data engineering. Outlines.
E N D
Three-Party Authenticated Key Agreements and Its Applications- PCSs Roaming Protocol 李添福 (Tian-Fu Lee) 國立成功大學資訊工程博士 Cryptography/ Network security/ Wireless networks communication/ Algorithmic graph theory/ Database and data engineering
Outlines • Three-Party Authenticated Key Agreements (3PAKA) • Applications • Portable Communication Systems (PCSs) Roaming Protocol • RFID Protocol • E-Payment Protocol • Electronic Medical Record Security and Privacy • Vehicular Mobile Network • Proposed PCSs Roaming Protocol • Delegation-Based Authentication Protocol for PCSs • Security discussion • Computational comparison & Experimental Results • Conclusions
Three-Party Authenticated Key Agreements • An authenticated key agreement protocol is an interactive method for two or more parties to determine session keys based on their secret keys or public/private keys. Trusted server Authentication Authentication Key agreement / key exchange SK Secure communication
Portable Communication Systems Roaming Protocol Mobile Station PDA Visited Network Home Network cellular phone notebook
RFID Protocol Tag Reader Database Server
E-Payment Protocol E-Bank Seller Buyer
醫療資訊安全-電子病歷安全與隱私(Electronic Medical Record Security and Privacy) 政府衛生行政單位 電子病歷Database 健保機關 IC card Hospital 一般民眾
Proposed PCSs Roaming Protocol Delegation-Based Authentication Protocol for PCSs
Delegation-Based Authentication Protocol for PCSs • Registration • On-line authentication process • i-th Off-line authentication process
Delegation-Based Authentication Protocol for PCSs HN (x,v=gx) Delegation ((x),K) Public key (v) MS VN Proxy signature Verify the signature by v
On-line authentication process HN (,KVH) MS (,K) VN (KVH;pk:v) Sing(msg.),K Verify K KIDMS SK,h(token) SK, token Obtain SK Obtain SK
i-th Off-line authentication process HN MS (SKi, tokeni) VN (SKi, h(tokeni)) ESKi(tokeni,h(tokeni+1)) Verify tokeni Keep h(tokeni+1) Compute SKi+1 Compute SKi+1
comparison • Previous Scheme: • tokeniand tokeni+1 are independent. • HN can forge tokeni • Have not non-repudiation • Charge Problem : • Mobile users deny has used servicesand refuse to pay. • Overcharge mobile users for services that he did not request. [IEEE Trans. Wireless Commun. 2005] • Proposed Scheme: • All tokeniare chained by backward hash-chain and are decided by MS. • HN cannot forge tokeni • Have non-repudiation • Pre-Compute and reduce the computational cost in MS. [IEEE Trans. Wireless Commun. 2009]
i-th Off-line authentication process Pre-compute and store h(1)(n1), h(2)(n1) (=tokenn), …, h(n)(n1)(=token2), h(n+1)(n1)(=token1) token1 HN MS (SKi, tokeni) VN (SKi, h(tokeni)) ESKi(tokeni) Verify tokeni Keep tokeni =h(tokeni+1) Compute SKi+1 Compute SKi+1
Computational comparison of MS *: Can be pre-computed in this entry.
Conclusions • Three-party authenticated key agreements and its applications • Proposed secure and efficient delegation-based authentication protocol for PCSs • Future researches • Vehicular Mobile Network • Electronic Medical Record Security and Privacy
References • Lee, T.-F., Hwang, T. and Lin C.-L. “Enhanced Three-Party Encrypted Key Exchange without Server Public Keys,” Computers & Security, Volume: 23, Issue: 7, pp. 571-577, October, 2004. • Wen, H.-A., Lee, T.-F. and Hwang, T. “A Provably Secure Three-Party Password-based Authenticated Key Exchange Protocol Using Weil Pairing,” IEE Proc. Communications, Vol. 152, No. 2, pp. 138-143, April 2005. • Lee, T.-F., Liu, J.-L., Sung, M.-J., Yang, S.-B. and Chen, C.-M., “Communication-Efficient Three-Party Protocols for Authentication and Key Agreement”, Computers and Mathematics with Applications, Vol. 58, No, 4, pp.641-648, August, 2009. • Lee, T.-F., Chang, C.-C. and Hwang, T. “Private Authentication Techniques for the Global Mobility Network,” Wireless Personal Communications, Vol. 35,Issue: 4, pp. 329-336, December 2005. • Lee, W.-B. and Yeh, C.-K., “A new delegation-based authentication protocol for use in portable communication systems,” IEEE Trans. Wireless Commun., vol. 4, no.1, pp.57-64, January 2005. • Lee, T.-F., Chang, S.-H., Hwang, T. and Chong, S.-K., “Enhanced Delegation-Based Authentication Protocol for PCSs”, IEEE Trans. Wireless Commun., Vol.8, No. 5, pp. 2166-2171, May 2009.