Article ID Journal Published Year Pages File Type
456324 Computers & Security 2006 8 Pages PDF
Abstract

Low power computing devices such as cellular phones, PDAs, and smart cards are very popular and widely used by people nowadays. To secure communications between a client and a server through a low power computing device, several AKE–LPC (Authenticated Key Exchange – for Low Power Computing clients) protocols have been proposed recently. This paper proposes a new efficient AKE–LPC protocol, which requires the client to perform only one hash operation during the execution phase. An augmented protocol which can additionally provide explicit mutual authentication is also presented. Furthermore, the security of the proposed protocols is formally proven in the random oracle model.

Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, , ,