Anonymity-based authenticated key agreement with full binding property

Jung Yeon Hwang, Sungwook Eom, Ku Young Chang, Pil Joong Lee, Dae Hun Nyang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

In this paper we propose anonymity-based authentication and key agreement protocols where no participant’s identity is revealed. The proposed protocols guarantee stronger notion of security which is called full binding property for communication messages. Under the notion of full binding, a verifier can confirm that an anonymous participant has not turned over a session to another anonymous participant while connecting to the verifier and also a session hijacking does not happen. Our approach is to use an anonymous signature scheme with a signer-controlled yet partially enforced linkability. We formally prove that the constructed protocols are secure.

Original languageEnglish
Title of host publicationInformation Security Applications - 13th International Workshop, WISA 2012, Revised Selected Papers
EditorsDong Hoon Lee, Moti Yung
PublisherSpringer Verlag
Pages177-191
Number of pages15
ISBN (Print)9783642354151
DOIs
StatePublished - 2012
Event13th International Workshop on Information Security Applications, WISA 2012 - Jeju Island, Korea, Republic of
Duration: 16 Aug 201218 Aug 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7690 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference13th International Workshop on Information Security Applications, WISA 2012
Country/TerritoryKorea, Republic of
CityJeju Island
Period16/08/1218/08/12

Bibliographical note

Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 2012.

Keywords

  • Anonymity
  • Authentication
  • Full binding property
  • Key agreement
  • Session hijacking
  • Session turn-over

Fingerprint

Dive into the research topics of 'Anonymity-based authenticated key agreement with full binding property'. Together they form a unique fingerprint.

Cite this