Next Article in Journal
Generalized Interval Neutrosophic Choquet Aggregation Operators and Their Applications
Previous Article in Journal
Multimedia System for Real-Time Photorealistic Nonground Modeling of 3D Dynamic Environment for Remote Control System
Article Menu
Issue 4 (April) cover image

Export Article

Open AccessArticle
Symmetry 2018, 10(4), 84; https://doi.org/10.3390/sym10040084

Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated Key Agreement Protocol for Mobile Distributed Computing Environments

1
Department of Applied Informatics and Multimedia, Asia University, Lioufeng Rd., Wufeng, Taichung 413, Taiwan
2
Department of Industrial Education and Technology, National Changhua University of Education, Changhua City 500, Taiwan
*
Author to whom correspondence should be addressed.
Received: 25 January 2018 / Revised: 9 March 2018 / Accepted: 13 March 2018 / Published: 28 March 2018
Full-Text   |   PDF [29848 KB, uploaded 3 May 2018]   |  

Abstract

A three-party Authenticated Key Agreement (AKA) protocol in the distributed computing environment is a client that requests services from an application server through an authentication server. The authentication server is responsible for authenticating the participating entities and helping them to construct a common session key. Adopting the Key Transfer Authentication Protocol (KTAP) in such an environment, the authentication server is able to monitor the communication messages to prevent and trace network crime. However, the session key in the KTAP setting is created only by the authentication server and is vulnerable to the resilience of key control. On the other hand, with the rapid growth of network technologies, mobile devices are widely used by people to access servers in the Internet. Many AKA protocols for mobile devices have been proposed, however, most protocols are vulnerable to Ephemeral Secret Leakage (ESL) attacks which compromise the private keys of clients and the session key by an adversary from eavesdropped messages. This paper proposes a novel ESL-secure ID-based three-party AKA protocol for mobile distributed computing environments based on ESL-secure ID-based Authenticated Key Exchange (ID-AKE) protocol. The proposed protocol solves the key control problem in KTAP while retaining the advantages of preventing and tracing network crime in KTAP and also resists ESL attacks. The AVISPA tool simulation results confirm the correctness of the protocol security analysis. Furthermore, we present a parallel version of the proposed ESL-secure ID-based three-party AKA protocol that is communication-efficient. View Full-Text
Keywords: Ephemeral-Secret-Leakage; distributed computing; three-party authenticated key agreement protocol; mobile device; bilinear pairing; Automated Validation of Internet Security Protocols and Applications (AVISPA) tool Ephemeral-Secret-Leakage; distributed computing; three-party authenticated key agreement protocol; mobile device; bilinear pairing; Automated Validation of Internet Security Protocols and Applications (AVISPA) tool
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Liu, C.-L.; Tsai, W.-J.; Chang, T.-Y.; Liu, T.-M. Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated Key Agreement Protocol for Mobile Distributed Computing Environments. Symmetry 2018, 10, 84.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Symmetry EISSN 2073-8994 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top