Nothing Special   »   [go: up one dir, main page]

Skip to main content

Advertisement

Log in

An enhanced key exchange protocol exhibiting key compromise impersonation attacks resistance in mobile commerce environment

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Islam S K H, Amin R, Biswas G P, et al. An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments. J King Saud Univ — Comput Inf Sci, 2017, 29: 311–324

    Google Scholar 

  2. Tan Z T. An improvement on a three-party authentication key exchange protocol using elliptic curve cryptography. J Converg Inf Tech, 2010, 5: 120–129

    Google Scholar 

  3. Wei W, Chen J Z, Li D, et al. Partially known information attack on SM2 key exchange protocol. Sci China Inf Sci, 2019, 62: 32105

    Article  Google Scholar 

  4. Yoon E J, Yoo K Y. Robust biometric-based three-party authenticated key establishment protocols. Int J Comput Math, 2011, 88: 1144–1157

    Article  Google Scholar 

  5. Islam S K H. Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps. Inf Sci, 2015, 312: 104–130

    Article  MathSciNet  Google Scholar 

  6. Arshad H, Rasoolzadegan A. Design of a secure authentication and key agreement scheme preserving user privacy usable in telecare medicine information systems. J Med Syst, 2016, 40: 237

    Article  Google Scholar 

  7. Ostad-Sharif A, Abbasinezhad-Mood D, Nikooghadam M. A robust and efficient ECC-based mutual authentication and session key generation scheme for healthcare applications. J Med Syst, 2019, 43: 10

    Article  Google Scholar 

  8. Wang D, Cheng H B, He D B, et al. On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices. IEEE Syst J, 2018, 12: 916–925

    Article  Google Scholar 

  9. Liu X X, Li Y P, Qu J, et al. MAKA: provably secure multi-factor authenticated key agreement protocol. J Int Tech, 2018, 19: 669–677

    Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant Nos. U1708262, U1736203, 61872449).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qingfeng Cheng.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, T., Li, X. & Cheng, Q. An enhanced key exchange protocol exhibiting key compromise impersonation attacks resistance in mobile commerce environment. Sci. China Inf. Sci. 64, 199106 (2021). https://doi.org/10.1007/s11432-019-2645-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-019-2645-x

Navigation