Common Contracts

1 similar Authentication and Key Agreement contracts

Authentication and Key Agreement Protocols Preserving Anonymity
Authentication and Key Agreement • April 5th, 2006

Anonymity is a very important security feature in ad- dition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication and key agreement (AKA) protocols: the AKA protocol with user anonymity (UAP) and the AKA protocol with user and server anonymity (USAP). The proposed protocols have the following advantages: first of all, they preserve anonymity, which is a security feature that was ignored in most of the previously proposed AKA protocols; secondly, they exploit the difference in capabil- ities between resource constrained clients and highly re- sourceful servers and thus are suitable for wireless applica- tions; thirdly, they resist known attacks; and finally, they perform better in terms of the number of messages and bits exchanged and computing time as compared to the previously proposed AKA protocols. For example, USAP preserves user and server anonymity, exchanges 3 mes- sages with 1920 bits in total, and requires only 2

AutoNDA by SimpleDocs
Time is Money Join Law Insider Premium to draft better contracts faster.