Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2013 (2013), Article ID 858579, 11 pages
http://dx.doi.org/10.1155/2013/858579
Research Article

Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties

Department of Electrical Engineering, Chang Gung University, 259 Wen-Hwa 1st Road, Kwei-Shan, Taoyuan 333, Taiwan

Received 12 April 2013; Revised 25 May 2013; Accepted 26 May 2013

Academic Editor: Wang Xing-yuan

Copyright © 2013 Shin-Yan Chiou. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. L. Lamport, “Password authentication with insecure communication,” Communications of the ACM, vol. 24, no. 11, pp. 770–772, 1981. View at Publisher · View at Google Scholar · View at Scopus
  2. A. K. Awasthi and S. Lal, “A remote user authentication scheme using smart cards with forward secrecy,” IEEE Transactions on Consumer Electronics, vol. 49, no. 4, pp. 1246–1248, 2003. View at Publisher · View at Google Scholar · View at Scopus
  3. A. K. Awasthi and S. Lal, “An enhanced remote user authentication scheme using smart cards,” IEEE Transactions on Consumer Electronics, vol. 50, no. 2, pp. 583–586, 2004. View at Publisher · View at Google Scholar · View at Scopus
  4. N. Koblitz, “Elliptic curve cryptosystems,” Mathematics of Computation, vol. 48, no. 177, pp. 203–209, 1987. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  5. T. Kwon, Y. H. Park, and H. J. Lee, “Security analysis and improvement of the efficient password-based authentication protocol,” IEEE Communications Letters, vol. 9, no. 1, pp. 93–95, 2005. View at Publisher · View at Google Scholar · View at Scopus
  6. R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  7. N. M. Al-Saidi, M. R. M. Said, and W. A. M. Othman, “Password authentication based on fractal coding scheme,” Journal of Applied Mathematics, vol. 2012, Article ID 340861, 16 pages, 2012. View at Publisher · View at Google Scholar
  8. S. G. Yoo, K. Y. Park, and J. Kim, “A security-performance-balanced user authentication scheme for wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 2012, Article ID 382810, 11 pages, 2012. View at Publisher · View at Google Scholar
  9. W. Diffie and M. E. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644–654, 1976. View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  10. C. Wang and J. Luo, “An efficient key-policy attribute-based encryption scheme with constant ciphertext length,” Mathematical Problems in Engineering, vol. 2013, Article ID 810969, 7 pages, 2013. View at Publisher · View at Google Scholar
  11. M. Rahnema, “Overview of the GSM system and protocol architecture,” IEEE Communications Magazine, vol. 31, no. 4, pp. 92–100, 1993. View at Google Scholar
  12. K. Al-Tawil, A. Akrami, and H. Youssef, “A new authentication protocol for GSM networks,” in Proceedings of the 23rd Conference on Local Computer Networks (LCN '98), pp. 21–30, October 1998. View at Scopus
  13. X. Cao, W. Kou, Y. Yu, and R. Sun, “Identity-based authenticated key agreement protocols without bilinear pairings,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 91, no. 12, pp. 3833–3836, 2008. View at Publisher · View at Google Scholar · View at Scopus
  14. L. Law, A. Menezes, M. Qu, J. Solinas, and S. Vanstone, “An efficient protocol for authenticated key agreement,” Designs, Codes, and Cryptography, vol. 28, no. 2, pp. 119–134, 2003. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  15. E. Chen, “Unsupervised user similarity mining in gsm sensor networks,” The Scientific World Journal, vol. 2013, Article ID 589610, 11 pages, 2013. View at Publisher · View at Google Scholar
  16. F. Bayrakceken and K. Yegin, “Fluorescence, decay time, and structural change of laser dye cresyl violet in solution due to microwave irradiation at gsm 900/1800 mobile phone frequencies,” International Journal of Photoenergy, vol. 2012, Article ID 965426, 4 pages, 2012. View at Publisher · View at Google Scholar
  17. N. McCullagh and P. S. L. M. Barreto, “A new two-party identity-based authenticated key agreement,” in Topics in Cryptology—CT-RSA 2005, vol. 3376, pp. 262–274, Springer, Berlin, Germany, 2005. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  18. M. Aydos, B. Sunar, and C. Koc, “An elliptic curve cryptography based authentication and key agreement protocol for wireless communication,” in Proceedings of the 2nd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications Symposium on Information Theory, 1998.
  19. M. J. Beller, L.-F. Chang, and Y. Yacobi, “Privacy and authentication on a portable communications system,” IEEE Journal on Selected Areas in Communications, vol. 11, no. 6, pp. 821–829, 1993. View at Publisher · View at Google Scholar · View at Scopus
  20. C.-C. Lo and Y.-J. Chen, “Secure communication mechanisms for GSM networks,” IEEE Transactions on Consumer Electronics, vol. 45, no. 4, pp. 1074–1080, 1999. View at Publisher · View at Google Scholar · View at Scopus
  21. A. Klimm, B. Glas, M. Wachs, S. Vogel, K. D. Müller-Glaser, and J. Becker, “A security scheme for dependable key insertion in mobile embedded devices,” International Journal of Reconfigurable Computing, vol. 2011, Article ID 820454, 19 pages, 2011. View at Publisher · View at Google Scholar · View at Scopus
  22. W. Ren, J. Song, M. Lei, and Y. Ren, “BVS: a lightweight forward and backward secure scheme for PMU communications in smart grid,” International Journal of Digital Multimedia Broadcasting, vol. 2011, Article ID 382147, 9 pages, 2011. View at Publisher · View at Google Scholar · View at Scopus
  23. Y. Kong and B. Phillips, “Revisiting sum of residues modular multiplication,” Journal of Electrical and Computer Engineering, vol. 2010, Article ID 657076, 9 pages, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  24. X. Lu, W. Wang, and J. Ma, “Authentication and integrity in the smart grid: an empirical study in substation automation systems,” International Journal of Distributed Sensor Networks, vol. 2012, Article ID 175262, 13 pages, 2012. View at Publisher · View at Google Scholar
  25. Certicom Research: Standard for efficient cryptography—SEC 1: Elliptic curve cryptography, 2000, http://www.secg.org/.
  26. Z. Cheng, M. Nistazakis, R. Comley, and L. Vasiu, “On the indistinguishability-based security model of key agreement protocols-simple cases,” in Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS '04), vol. 4, 2004.
  27. W. Shi and P. Gong, “A new user authentication protocol for wireless sensor networks using elliptic curves cryptography,” International Journal of Distributed Sensor Networks, vol. 2013, Article ID 730831, 7 pages, 2013. View at Publisher · View at Google Scholar
  28. J. Portilla, A. Otero, E. de la Torre et al., “Adaptable security in wireless sensor networks by using reconfigurable ECC hardware coprocessors,” International Journal of Distributed Sensor Networks, vol. 2011, Article ID 740823, 12 pages, 2011. View at Publisher · View at Google Scholar · View at Scopus
  29. National Institute of Standards and Technology, NIST Special Publication 800-56: recommendation on key establishment schemes, Draft 2.0, 2003, http://csrc.nist.gov/groups/ST/toolkit/index.html.
  30. R. Sakai, K. Ohgishi, and M. Kasahara, “Cryptosystems based on pairing,” in Proceedings of the Symposium on Cryptography and Information Security, pp. 135–148, Okinawa, Japan, 2000.
  31. X. Cao, W. Kou, and X. Du, “A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges,” Information Sciences, vol. 180, no. 15, pp. 2895–2903, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  32. L. Chen and C. Kudla, “Identity based authenticated key agreement protocols from pairings,” in Proceedings of the 16th IEEE Computer Security Foundations Workshop, pp. 219–233, 2003.
  33. E. Okamoto, “Proposal for identity-based key distribution systems,” Electronics Letters, vol. 22, no. 24, pp. 1283–1284, 1986. View at Google Scholar · View at Scopus
  34. K. Shim, “Efficient ID-based authenticated key agreement protocol based on Weil pairing,” Electronics Letters, vol. 39, no. 8, pp. 653–654, 2003. View at Publisher · View at Google Scholar · View at Scopus
  35. N. P. Smart, “Identity-based authenticated key agreement protocol based on Weil pairing,” Electronics Letters, vol. 38, no. 13, pp. 630–632, 2002. View at Publisher · View at Google Scholar · View at Scopus
  36. K. Tanaka and E. Okamoto, “Key distribution system for mail systems using ID-related information directory,” Computers and Security, vol. 10, no. 1, pp. 25–33, 1991. View at Google Scholar · View at Scopus
  37. H. Sun and B. Hsieh, “Security analysis of shims authenticated key agreement protocols from pairings,” Tech. Rep. 113, 2003. View at Google Scholar
  38. K. Choo, “Revisit of mccullagh-barreto two-party id-based authenticated key agreement protocols,” International Journal of Network Security, vol. 1, no. 3, pp. 154–160, 2005. View at Google Scholar
  39. X. Wang and J. Zhao, “An improved key agreement protocol based on chaos,” Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 12, pp. 4052–4057, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  40. D. Xiao, X. Liao, and S. Deng, “A novel key agreement protocol based on chaotic maps,” Information Sciences, vol. 177, no. 4, pp. 1136–1142, 2007. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  41. S. Han, “Security of a key agreement protocol based on chaotic maps,” Chaos, Solitons and Fractals, vol. 38, no. 3, pp. 764–768, 2008. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  42. E. Chang and S. Han, “Using passphrase to construct key agreement. CBS-IS,” Tech. Rep., Curtin University of Technology, 2006. View at Google Scholar
  43. S. Han and E. Chang, “Chaotic map based key agreement with/out clock synchronization,” Chaos, Solitons and Fractals, vol. 39, no. 3, pp. 1283–1289, 2009. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  44. X.-Y. Wang and J.-F. Zhao, “Cryptanalysis on a parallel keyed hash function based on chaotic neural network,” Neurocomputing, vol. 73, no. 16–18, pp. 3224–3228, 2010. View at Publisher · View at Google Scholar · View at Scopus
  45. P. Bergamo, P. D'Arco, A. de Santis, and L. Kocarev, “Security of public-key cryptosystems based on Chebyshev polynomials,” IEEE Transactions on Circuits and Systems I, vol. 52, no. 7, pp. 1382–1393, 2005. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  46. Y. Niu and X. Wang, “An anonymous key agreement protocol based on chaotic maps,” Communications in Nonlinear Science and Numerical Simulation, vol. 16, no. 4, pp. 1986–1992, 2011. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  47. H.-R. Tseng, R.-H. Jan, and W. Yang, “A chaotic maps-based key agreement protocol that preserves user anonymity,” in Proceedings of the IEEE International Conference on Communications (ICC '09), pp. 1–6, June 2009. View at Publisher · View at Google Scholar · View at Scopus
  48. T. Haist and W. Osten, “White-light interferometric method for secure key distribution,” The Journal of Supercomputing, vol. 62, no. 2, pp. 656–662, 2012. View at Publisher · View at Google Scholar · View at Scopus
  49. J. Álvarez-Bermejo, N. Antequera, R. García-Rubio, and J. López-Ramos, “A scalable server for key distribution and its application to accounting,” The Journal of Supercomputing, vol. 64, no. 1, pp. 132–143, 2013. View at Google Scholar
  50. Wikipedia, Wi-Fi Direct, 2012, http://en.wikipedia.org/wiki/Wi-Fi_Direct/.
  51. S. Bluetooth, Bluetooth specification, 2012, http://www.Bluetooth.com/.
  52. C. Bisdikian, “An overview of the Bluetooth wireless technology,” IEEE Communications Magazine, vol. 39, no. 12, pp. 86–94, 2001. View at Publisher · View at Google Scholar · View at Scopus
  53. A. Specification, Infrared Data Association (IrDA) Std, 1998.