Abstract
Many people conveniently can use Internet banking, online shopping and e-payment. Those services need low computation load and secure protocol against various attacks for using them in mobile environment. As a result of active research for this topic, Elliptic Curve Cryptography (ECC) is used to reduce computation load and various protocols that are based on Discrete Logarithm Problem (DLP) and Computational Diffie Hellman Problem (CDH) have been presented. But some protocols are vulnerable to privileged-insider attack. This paper introduces an efficient ID-based mutual authentication with key agreement protocol by solving problems of the previous, so it is strong secure against all known attacks, especially privileged-insider attack.
Original language | English |
---|---|
Title of host publication | 2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
ISBN (Print) | 9781467365376 |
DOIs | |
Publication status | Published - 2015 Oct 5 |
Event | 5th International Conference on IT Convergence and Security, ICITCS 2015 - Kuala Lumpur, Malaysia Duration: 2015 Aug 24 → 2015 Aug 27 |
Other
Other | 5th International Conference on IT Convergence and Security, ICITCS 2015 |
---|---|
Country/Territory | Malaysia |
City | Kuala Lumpur |
Period | 15/8/24 → 15/8/27 |
Keywords
- Authentication
- Elliptic curve cryptography
- Elliptic curves
- Mobile communication
- Protocols
- Servers
ASJC Scopus subject areas
- Computer Networks and Communications
- Signal Processing