The Community for Technology Leaders
2013 Third International Conference on Advanced Computing & Communication Technologies (ACCT 2013) (2013)
Rohtak
April 6, 2013 to April 7, 2013
ISSN: 2327-0632
ISBN: 978-1-4673-5965-8
pp: 226-230
ABSTRACT
Recently, Lee et. al. carried out the cryptanalysis of Juang et. al. two-factor authentication key exchange protocol in Public wireless LANs. It was shown that Juang et.al. protocol is vulnerable to the stolen verifier attack and doesn't satisfy the user anonymity. Apart from the, high computational overhead of the server. This paper, proposes an improved protocol towards authentication and key exchange based on Elliptic Curve Decision Diffie-Hellman(DDH) problem which ensures their strong resistance towards the existing weaknesses. Besides this, their security and performance analysis shows that the proposed protocol is more secure and efficient.
INDEX TERMS
cryptographic protocols, message authentication, public key cryptography, wireless LAN
CITATION

A. Singh and R. Rishi, "An Improved Two-Factor Authenticated Key Exchange Protocol in Public Wireless LANs," 2013 Third International Conference on Advanced Computing & Communication Technologies (ACCT 2013)(ACCT), Rohtak, 2013, pp. 226-230.
doi:10.1109/ACCT.2013.58
92 ms
(Ver 3.3 (11022016))