

Author: Ding Yan
Publisher: Springer Publishing Company
ISSN: 0929-6212
Source: Wireless Personal Communications, Vol.70, Iss.4, 2013-06, pp. : 1473-1485
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Most of the existing authentication and key agreement protocols for delay tolerant networks are not designed for protecting privacy. In this paper, an authentication and key agreement protocol with anonymity based on combined public key is proposed. The proposed protocol eliminates the need of public key digital certificate on-line retrieval, so that any on-line trusted third party is no longer required, only needs an off-line public information repository and key generation center; and realizes mutual authentication and key agreement with anonymity between two entities. We show that the proposed protocol is secure for all probabilistic polynomial-time attackers, and achieves good security properties, including authentication, anonymity, and confidentiality and so on.
Related content


A link contact duration-based routing protocol in delay-tolerant networks
Wireless Networks, Vol. 19, Iss. 6, 2013-08 ,pp. :


An efficient authentication protocol for mobile communications
Telecommunication Systems, Vol. 46, Iss. 1, 2011-01 ,pp. :



