دانلود مقاله ISI انگلیسی شماره 157473
ترجمه فارسی عنوان مقاله

یک پروتکل مبادله کلیدی تأیید شده سه طرفه با استفاده از تابع هش و رمزنگاری منحنی بیضوی برای محیط های تجارت الکترونیک

عنوان انگلیسی
An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments
کد مقاله سال انتشار تعداد صفحات مقاله انگلیسی
157473 2017 21 صفحه PDF
منبع

Publisher : Elsevier - Science Direct (الزویر - ساینس دایرکت)

Journal : Journal of King Saud University - Computer and Information Sciences, Volume 29, Issue 3, July 2017, Pages 311-324

ترجمه کلمات کلیدی
رمزنگاری منحنی بیضوی، پروتکل مبادله کلید معتبر، حمله مرد در میان، محیط های تجارت الکترونیک،
کلمات کلیدی انگلیسی
Elliptic curve cryptography; Authenticated key exchange protocol; Man-in-the-middle attack; Mobile-commerce environments;
پیش نمایش مقاله
پیش نمایش مقاله  یک پروتکل مبادله کلیدی تأیید شده سه طرفه با استفاده از تابع هش و رمزنگاری منحنی بیضوی برای محیط های تجارت الکترونیک

چکیده انگلیسی

In the literature, many three-party authenticated key exchange (3PAKE) protocols are put forwarded to established a secure session key between two users with the help of trusted server. The computed session key will ensure secure message exchange between the users over any insecure communication networks. In this paper, we identified some deficiencies in Tan’s 3PAKE protocol and then devised an improved 3PAKE protocol without symmetric key en/decryption technique for mobile-commerce environments. The proposed protocol is based on the elliptic curve cryptography and one-way cryptographic hash function. In order to prove security validation of the proposed 3PAKE protocol we have used widely accepted AVISPA software whose results confirm that the proposed protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The proposed protocol is not only secure in the AVISPA software, but it also secure against relevant numerous security attacks such as man-in-the-middle attack, impersonation attack, parallel attack, key-compromise impersonation attack, etc. In addition, our protocol is designed with lower computation cost than other relevant protocols. Therefore, the proposed protocol is more efficient and suitable for practical use than other protocols in mobile-commerce environments.