An efficient ID-based mutual authentication secure against privileged-insider attack

Song Yi Kim, Hyoseung Kim, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Many people conveniently can use Internet banking, online shopping and e-payment. Those services need low computation load and secure protocol against various attacks for using them in mobile environment. As a result of active research for this topic, Elliptic Curve Cryptography (ECC) is used to reduce computation load and various protocols that are based on Discrete Logarithm Problem (DLP) and Computational Diffie Hellman Problem (CDH) have been presented. But some protocols are vulnerable to privileged-insider attack. This paper introduces an efficient ID-based mutual authentication with key agreement protocol by solving problems of the previous, so it is strong secure against all known attacks, especially privileged-insider attack.

Original languageEnglish
Title of host publication2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Print)9781467365376
DOIs
Publication statusPublished - 2015 Oct 5
Event5th International Conference on IT Convergence and Security, ICITCS 2015 - Kuala Lumpur, Malaysia
Duration: 2015 Aug 242015 Aug 27

Other

Other5th International Conference on IT Convergence and Security, ICITCS 2015
CountryMalaysia
CityKuala Lumpur
Period15/8/2415/8/27

Keywords

  • Authentication
  • Elliptic curve cryptography
  • Elliptic curves
  • Mobile communication
  • Protocols
  • Servers

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Signal Processing

Fingerprint Dive into the research topics of 'An efficient ID-based mutual authentication secure against privileged-insider attack'. Together they form a unique fingerprint.

  • Cite this

    Kim, S. Y., Kim, H., & Lee, D. H. (2015). An efficient ID-based mutual authentication secure against privileged-insider attack. In 2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings [7292941] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICITCS.2015.7292941