Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
456324 | Computers & Security | 2006 | 8 Pages |
Abstract
Low power computing devices such as cellular phones, PDAs, and smart cards are very popular and widely used by people nowadays. To secure communications between a client and a server through a low power computing device, several AKE–LPC (Authenticated Key Exchange – for Low Power Computing clients) protocols have been proposed recently. This paper proposes a new efficient AKE–LPC protocol, which requires the client to perform only one hash operation during the execution phase. An augmented protocol which can additionally provide explicit mutual authentication is also presented. Furthermore, the security of the proposed protocols is formally proven in the random oracle model.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Hsiang-An Wen, Chun-Li Lin, Tzonelih Hwang,