1 / 21

Three-Party Authenticated Key Agreements and Its Applications- PCSs Roaming Protocol

Three-Party Authenticated Key Agreements and Its Applications- PCSs Roaming Protocol. 李添福 (Tian-Fu Lee) 國立成功大學資訊工程博士 Cryptography/ Network security/ Wireless networks communication/ Algorithmic graph theory/ Database and data engineering. Outlines.

karsen
Download Presentation

Three-Party Authenticated Key Agreements and Its Applications- PCSs Roaming Protocol

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Three-Party Authenticated Key Agreements and Its Applications- PCSs Roaming Protocol 李添福 (Tian-Fu Lee) 國立成功大學資訊工程博士 Cryptography/ Network security/ Wireless networks communication/ Algorithmic graph theory/ Database and data engineering

  2. Outlines • Three-Party Authenticated Key Agreements (3PAKA) • Applications • Portable Communication Systems (PCSs) Roaming Protocol • RFID Protocol • E-Payment Protocol • Electronic Medical Record Security and Privacy • Vehicular Mobile Network • Proposed PCSs Roaming Protocol • Delegation-Based Authentication Protocol for PCSs • Security discussion • Computational comparison & Experimental Results • Conclusions

  3. Three-Party Authenticated Key Agreements • An authenticated key agreement protocol is an interactive method for two or more parties to determine session keys based on their secret keys or public/private keys. Trusted server Authentication Authentication Key agreement / key exchange SK Secure communication

  4. Portable Communication Systems Roaming Protocol Mobile Station PDA Visited Network Home Network cellular phone notebook

  5. RFID Protocol Tag Reader Database Server

  6. E-Payment Protocol E-Bank Seller Buyer

  7. 醫療資訊安全-電子病歷安全與隱私(Electronic Medical Record Security and Privacy) 政府衛生行政單位 電子病歷Database 健保機關 IC card Hospital 一般民眾

  8. Vehicular Mobile Network

  9. Proposed PCSs Roaming Protocol  Delegation-Based Authentication Protocol for PCSs

  10. Delegation-Based Authentication Protocol for PCSs • Registration • On-line authentication process • i-th Off-line authentication process

  11. Delegation-Based Authentication Protocol for PCSs HN (x,v=gx) Delegation ((x),K) Public key (v) MS VN Proxy signature Verify the signature by v

  12. On-line authentication process HN (,KVH) MS (,K) VN (KVH;pk:v) Sing(msg.),K Verify K KIDMS SK,h(token) SK, token Obtain SK Obtain SK

  13. i-th Off-line authentication process HN MS (SKi, tokeni) VN (SKi, h(tokeni)) ESKi(tokeni,h(tokeni+1)) Verify tokeni Keep h(tokeni+1) Compute SKi+1 Compute SKi+1

  14. comparison • Previous Scheme: • tokeniand tokeni+1 are independent. •  HN can forge tokeni •  Have not non-repudiation •  Charge Problem : • Mobile users deny has used servicesand refuse to pay. • Overcharge mobile users for services that he did not request. [IEEE Trans. Wireless Commun. 2005] • Proposed Scheme: • All tokeniare chained by backward hash-chain and are decided by MS. •  HN cannot forge tokeni •  Have non-repudiation •  Pre-Compute and reduce the computational cost in MS. [IEEE Trans. Wireless Commun. 2009]

  15. i-th Off-line authentication process Pre-compute and store h(1)(n1), h(2)(n1) (=tokenn), …, h(n)(n1)(=token2), h(n+1)(n1)(=token1) token1 HN MS (SKi, tokeni) VN (SKi, h(tokeni)) ESKi(tokeni) Verify tokeni Keep tokeni =h(tokeni+1) Compute SKi+1 Compute SKi+1

  16. Security Discussion

  17. Computational comparison of MS *: Can be pre-computed in this entry.

  18. Experimental Results

  19. Experimental Results

  20. Conclusions • Three-party authenticated key agreements and its applications • Proposed secure and efficient delegation-based authentication protocol for PCSs • Future researches • Vehicular Mobile Network • Electronic Medical Record Security and Privacy

  21. References • Lee, T.-F., Hwang, T. and Lin C.-L. “Enhanced Three-Party Encrypted Key Exchange without Server Public Keys,” Computers & Security, Volume: 23, Issue: 7, pp. 571-577, October, 2004. • Wen, H.-A., Lee, T.-F. and Hwang, T. “A Provably Secure Three-Party Password-based Authenticated Key Exchange Protocol Using Weil Pairing,” IEE Proc. Communications, Vol. 152, No. 2, pp. 138-143, April 2005. • Lee, T.-F., Liu, J.-L., Sung, M.-J., Yang, S.-B. and Chen, C.-M., “Communication-Efficient Three-Party Protocols for Authentication and Key Agreement”, Computers and Mathematics with Applications, Vol. 58, No, 4, pp.641-648, August, 2009. • Lee, T.-F., Chang, C.-C. and Hwang, T. “Private Authentication Techniques for the Global Mobility Network,” Wireless Personal Communications, Vol. 35,Issue: 4, pp. 329-336, December 2005. • Lee, W.-B. and Yeh, C.-K., “A new delegation-based authentication protocol for use in portable communication systems,” IEEE Trans. Wireless Commun., vol. 4, no.1, pp.57-64, January 2005. • Lee, T.-F., Chang, S.-H., Hwang, T. and Chong, S.-K., “Enhanced Delegation-Based Authentication Protocol for PCSs”, IEEE Trans. Wireless Commun., Vol.8, No. 5, pp. 2166-2171, May 2009.

More Related