Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated Key Agreement Protocol for Mobile Distributed Computing Environments

A three-party Authenticated Key Agreement (AKA) protocol in the distributed computing environment is a client that requests services from an application server through an authentication server. The authentication server is responsible for authenticating the participating entities and helping them to...

Full description

Bibliographic Details
Main Authors: Chao-Liang Liu, Wang-Jui Tsai, Ting-Yi Chang, Ta-Ming Liu
Format: Article
Language:English
Published: MDPI AG 2018-03-01
Series:Symmetry
Subjects:
Online Access:http://www.mdpi.com/2073-8994/10/4/84
_version_ 1818001585127555072
author Chao-Liang Liu
Wang-Jui Tsai
Ting-Yi Chang
Ta-Ming Liu
author_facet Chao-Liang Liu
Wang-Jui Tsai
Ting-Yi Chang
Ta-Ming Liu
author_sort Chao-Liang Liu
collection DOAJ
description A three-party Authenticated Key Agreement (AKA) protocol in the distributed computing environment is a client that requests services from an application server through an authentication server. The authentication server is responsible for authenticating the participating entities and helping them to construct a common session key. Adopting the Key Transfer Authentication Protocol (KTAP) in such an environment, the authentication server is able to monitor the communication messages to prevent and trace network crime. However, the session key in the KTAP setting is created only by the authentication server and is vulnerable to the resilience of key control. On the other hand, with the rapid growth of network technologies, mobile devices are widely used by people to access servers in the Internet. Many AKA protocols for mobile devices have been proposed, however, most protocols are vulnerable to Ephemeral Secret Leakage (ESL) attacks which compromise the private keys of clients and the session key by an adversary from eavesdropped messages. This paper proposes a novel ESL-secure ID-based three-party AKA protocol for mobile distributed computing environments based on ESL-secure ID-based Authenticated Key Exchange (ID-AKE) protocol. The proposed protocol solves the key control problem in KTAP while retaining the advantages of preventing and tracing network crime in KTAP and also resists ESL attacks. The AVISPA tool simulation results confirm the correctness of the protocol security analysis. Furthermore, we present a parallel version of the proposed ESL-secure ID-based three-party AKA protocol that is communication-efficient.
first_indexed 2024-04-14T03:36:17Z
format Article
id doaj.art-e30aeb6763ba456198bf70fb6836a1e9
institution Directory Open Access Journal
issn 2073-8994
language English
last_indexed 2024-04-14T03:36:17Z
publishDate 2018-03-01
publisher MDPI AG
record_format Article
series Symmetry
spelling doaj.art-e30aeb6763ba456198bf70fb6836a1e92022-12-22T02:14:46ZengMDPI AGSymmetry2073-89942018-03-011048410.3390/sym10040084sym10040084Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated Key Agreement Protocol for Mobile Distributed Computing EnvironmentsChao-Liang Liu0Wang-Jui Tsai1Ting-Yi Chang2Ta-Ming Liu3Department of Applied Informatics and Multimedia, Asia University, Lioufeng Rd., Wufeng, Taichung 413, TaiwanDepartment of Industrial Education and Technology, National Changhua University of Education, Changhua City 500, TaiwanDepartment of Industrial Education and Technology, National Changhua University of Education, Changhua City 500, TaiwanDepartment of Industrial Education and Technology, National Changhua University of Education, Changhua City 500, TaiwanA three-party Authenticated Key Agreement (AKA) protocol in the distributed computing environment is a client that requests services from an application server through an authentication server. The authentication server is responsible for authenticating the participating entities and helping them to construct a common session key. Adopting the Key Transfer Authentication Protocol (KTAP) in such an environment, the authentication server is able to monitor the communication messages to prevent and trace network crime. However, the session key in the KTAP setting is created only by the authentication server and is vulnerable to the resilience of key control. On the other hand, with the rapid growth of network technologies, mobile devices are widely used by people to access servers in the Internet. Many AKA protocols for mobile devices have been proposed, however, most protocols are vulnerable to Ephemeral Secret Leakage (ESL) attacks which compromise the private keys of clients and the session key by an adversary from eavesdropped messages. This paper proposes a novel ESL-secure ID-based three-party AKA protocol for mobile distributed computing environments based on ESL-secure ID-based Authenticated Key Exchange (ID-AKE) protocol. The proposed protocol solves the key control problem in KTAP while retaining the advantages of preventing and tracing network crime in KTAP and also resists ESL attacks. The AVISPA tool simulation results confirm the correctness of the protocol security analysis. Furthermore, we present a parallel version of the proposed ESL-secure ID-based three-party AKA protocol that is communication-efficient.http://www.mdpi.com/2073-8994/10/4/84Ephemeral-Secret-Leakagedistributed computingthree-party authenticated key agreement protocolmobile devicebilinear pairingAutomated Validation of Internet Security Protocols and Applications (AVISPA) tool
spellingShingle Chao-Liang Liu
Wang-Jui Tsai
Ting-Yi Chang
Ta-Ming Liu
Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated Key Agreement Protocol for Mobile Distributed Computing Environments
Symmetry
Ephemeral-Secret-Leakage
distributed computing
three-party authenticated key agreement protocol
mobile device
bilinear pairing
Automated Validation of Internet Security Protocols and Applications (AVISPA) tool
title Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated Key Agreement Protocol for Mobile Distributed Computing Environments
title_full Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated Key Agreement Protocol for Mobile Distributed Computing Environments
title_fullStr Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated Key Agreement Protocol for Mobile Distributed Computing Environments
title_full_unstemmed Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated Key Agreement Protocol for Mobile Distributed Computing Environments
title_short Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated Key Agreement Protocol for Mobile Distributed Computing Environments
title_sort ephemeral secret leakage secure id based three party authenticated key agreement protocol for mobile distributed computing environments
topic Ephemeral-Secret-Leakage
distributed computing
three-party authenticated key agreement protocol
mobile device
bilinear pairing
Automated Validation of Internet Security Protocols and Applications (AVISPA) tool
url http://www.mdpi.com/2073-8994/10/4/84
work_keys_str_mv AT chaoliangliu ephemeralsecretleakagesecureidbasedthreepartyauthenticatedkeyagreementprotocolformobiledistributedcomputingenvironments
AT wangjuitsai ephemeralsecretleakagesecureidbasedthreepartyauthenticatedkeyagreementprotocolformobiledistributedcomputingenvironments
AT tingyichang ephemeralsecretleakagesecureidbasedthreepartyauthenticatedkeyagreementprotocolformobiledistributedcomputingenvironments
AT tamingliu ephemeralsecretleakagesecureidbasedthreepartyauthenticatedkeyagreementprotocolformobiledistributedcomputingenvironments