Home           Contact us           FAQs           
     Journal Home     |     Aim & Scope    |    Author(s) Information      |     Editorial Board     |     MSP Download Statistics
2013 (Vol. 5, Issue: 3)
Article Information:

Mutual-anonymity and Authentication Key Agreement Protocol

Tao Feng, Chuang Zou, Chunyan Liu and Zheng Hao
Corresponding Author:  Tao Feng 

Key words:  Anonymity, authentication and key agreement, ring signature, trusted computation, universally composable, ,
Vol. 5 , (3): 81-86
Submitted Accepted Published
April 08, 2013 May 03, 2013 September 01, 2013

According to the characteristics of trusted computation, we proposed an efficient pseudonym ring signature-based authentication and key agreement protocol with mutual anonymity. The use of ring signature can hide the identity information of communicating parties and effectively prevent the leakage of private information. Finally we derive a shared session key between them for their future secure communication especially in the trusted computation environment. Our protocol reaches the level of universally composable security and is more efficient.
Abstract PDF HTML
  Cite this Reference:
Tao Feng, Chuang Zou, Chunyan Liu and Zheng Hao, 2013. Mutual-anonymity and Authentication Key Agreement Protocol.  Research Journal of Information Technology , 5(3): 81-86.
    Advertise with us
ISSN (Online):  2041-3114
ISSN (Print):   2041-3106
Submit Manuscript
   Current Information
   Sales & Services
Home  |  Contact us  |  About us  |  Privacy Policy
Copyright © 2015. MAXWELL Scientific Publication Corp., All rights reserved