{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,3]],"date-time":"2024-08-03T05:58:15Z","timestamp":1722664695354},"reference-count":48,"publisher":"Wiley","issue":"2","license":[{"start":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T00:00:00Z","timestamp":1611705600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Security and Privacy"],"published-print":{"date-parts":[[2021,3]]},"abstract":"Abstract<\/jats:title>Elliptic curve Diffie\u2010Hellman (ECDH) scheme is the basic key exchange used in elliptic curve cryptography. ECDH is a public key cryptosystem based on the discrete logarithm problem, but is vulnerable to man\u2010in\u2010the\u2010middle attack because it does not authenticate the secret session key. The integration of the elliptic curve digital signature allows authenticating the secret session key of the ECDH scheme (A\u2010ECDH). However, it is a technique (A\u2010ECDH) that uses a single random variable and it has been shown in the literature that a single random variable does not make the system secure. Therefore, the use of two random variables has been suggested to secure an authentication scheme. In this paper, a new authentication scheme using the elliptic curve digital signature algorithm is proposed. The performance analysis of the proposed authentication protocol is performed. The comparative results from the perspective of security and computation time showed that the proposed authentication protocol is more efficient in terms of computation time compared to the related works and it provides all the security features.<\/jats:p>","DOI":"10.1002\/spy2.148","type":"journal-article","created":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T02:47:38Z","timestamp":1611802058000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Authenticated secret session key using elliptic curve digital signature algorithm"],"prefix":"10.1002","volume":"4","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-6115-9643","authenticated-orcid":false,"given":"Nissa","family":"Mehibel","sequence":"first","affiliation":[{"name":"LIMOSE Laboratory Faculty of Sciences University M'hamed Bougara of Boumerdes Boumerdes Algeria"}]},{"given":"M'hamed","family":"Hamadouche","sequence":"additional","affiliation":[{"name":"LIMOSE Laboratory Faculty of Sciences University M'hamed Bougara of Boumerdes Boumerdes Algeria"}]}],"member":"311","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_2_9_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_2_9_3_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJISP.2017070105"},{"key":"e_1_2_9_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0017-4"},{"key":"e_1_2_9_5_1","doi-asserted-by":"publisher","DOI":"10.1049\/el:19990724"},{"key":"e_1_2_9_6_1","doi-asserted-by":"publisher","DOI":"10.1049\/el:19930643"},{"key":"e_1_2_9_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/129902.129904"},{"key":"e_1_2_9_8_1","doi-asserted-by":"publisher","DOI":"10.1049\/el:19940052"},{"key":"e_1_2_9_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2004.825705"},{"issue":"1","key":"e_1_2_9_10_1","first-page":"9","article-title":"Establishment of authenticated secret session keys using digital signature standard","volume":"20","author":"Biswas GP","year":"2011","journal-title":"Inform Secur J"},{"key":"e_1_2_9_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-015-0146-7"},{"key":"e_1_2_9_12_1","doi-asserted-by":"crossref","unstructured":"MehibelN HamadoucheMH HaichourAS.A new key agreement method for symmetric encryption using elliptic curves. Paper presented at: International Conference on Computer Science and its Applications. Cham: Springer;2018: 79\u201388.","DOI":"10.1007\/978-3-319-98352-3_9"},{"key":"e_1_2_9_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2375-5"},{"key":"e_1_2_9_14_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"e_1_2_9_15_1","doi-asserted-by":"crossref","unstructured":"MillerVS.Use of elliptic curves in cryptography. Paper presented at: Conference on the Theory and Application of Cryptographic Techniques. Berlin Heidelberg: Springer;1985: 417\u2013426.","DOI":"10.1007\/3-540-39799-X_31"},{"key":"e_1_2_9_16_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008354106356"},{"key":"e_1_2_9_17_1","article-title":"A public key data encryption based on elliptic curves","volume":"2","author":"Mehibel N","year":"2017","journal-title":"Int J Math Comput Methods"},{"key":"e_1_2_9_18_1","doi-asserted-by":"crossref","unstructured":"MehibelN HamadoucheMH.A new algorithm for a public key cryptosystem using elliptic curve. Paper presented at: 2017 European Conference on Electrical Engineering and Computer Science (EECS). IEEE;2017: 17\u201322.","DOI":"10.1109\/EECS.2017.12"},{"key":"e_1_2_9_19_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJISP.2018010102"},{"key":"e_1_2_9_20_1","unstructured":"MenezesA.Some new key agreement protocols providing implicit authentication. Paper presented at: Workshop on Selected Areas in Cryptography 1997 CRC Press;1997."},{"key":"e_1_2_9_21_1","unstructured":"LawL MenezesA QuM SolinasJ VanstoneS.An efficient protocol for authenticated key agreement Tech. Rep. CORR 98\u201005 Department of C&O University of Waterloo;1998."},{"key":"e_1_2_9_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501981"},{"key":"e_1_2_9_23_1","doi-asserted-by":"crossref","unstructured":"KrawczykH.HMQV: a high\u2010performance secure Diffie\u2010Hellman protocol. Paper presented at: Annual International Cryptology Conference. Berlin Heidelberg: Springer;2005: 546\u2013566.","DOI":"10.1007\/11535218_33"},{"issue":"1","key":"e_1_2_9_24_1","first-page":"47","article-title":"Another look at HMQV","volume":"1","author":"Menezes A","year":"2007","journal-title":"Math Cryptol JMC"},{"key":"e_1_2_9_25_1","doi-asserted-by":"crossref","unstructured":"HaleviS KrawczykH.One\u2010pass HMQV and asymmetric key\u2010wrapping. Paper presented at: International Workshop on Public Key Cryptography. Berlin Heidelberg: Springer;2011: 317\u2013334.","DOI":"10.1007\/978-3-642-19379-8_20"},{"key":"e_1_2_9_26_1","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/7810352"},{"key":"e_1_2_9_27_1","doi-asserted-by":"crossref","unstructured":"LiuS SakuraiK WengJ ZhangF ZhaoY.Security model and analysis of FHMQV revisited. Paper presented at: International Conference on Information Security and Cryptology. Cham: Springer;2013: 255\u2013269.","DOI":"10.1007\/978-3-319-12087-4_16"},{"key":"e_1_2_9_28_1","doi-asserted-by":"crossref","unstructured":"SarrAP Elbaz\u2010VincentP BajardJC.A secure and efficient authenticated Diffie\u2010Hellman protocol. Paper presented at: European Public Key Infrastructure Workshop. Berlin Heidelberg: Springer;2009: 83\u201398.","DOI":"10.1007\/978-3-642-16441-5_6"},{"key":"e_1_2_9_29_1","doi-asserted-by":"crossref","unstructured":"SarrAP Elbaz\u2010VincentP.On the security of the (F) HMQV protocol. Paper presented at: International Conference on Cryptology in Africa. Cham: Springer;2016: 207\u2013224.","DOI":"10.1007\/978-3-319-31517-1_11"},{"key":"e_1_2_9_30_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJACT.2017.089357"},{"issue":"3","key":"e_1_2_9_31_1","first-page":"311","article-title":"An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile\u2010commerce environments","volume":"29","author":"Islam SH","year":"2017","journal-title":"J King Saud Univ Comput Inf Sci"},{"issue":"1","key":"e_1_2_9_32_1","first-page":"63","article-title":"A pairing\u2010free identity\u2010based two\u2010party authenticated key agreement protocol for secure and efficient communication","volume":"29","author":"Islam SH","year":"2017","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"e_1_2_9_33_1","first-page":"1","article-title":"A provably secure and lightweight identity\u2010based two\u2010party authenticated key agreement protocol for IIoT environments","author":"Gupta DS","year":"2020","journal-title":"IEEE Syst J"},{"key":"e_1_2_9_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2019.1637155"},{"key":"e_1_2_9_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2971707"},{"key":"e_1_2_9_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3038813"},{"key":"e_1_2_9_37_1","first-page":"75","volume-title":"Guide to Elliptic Curve Cryptography","author":"Hankerson D","year":"2004"},{"key":"e_1_2_9_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.259647"},{"issue":"7","key":"e_1_2_9_39_1","first-page":"50","article-title":"Responses to NIST's proposal","volume":"35","author":"Vanstone S","year":"1992","journal-title":"Commun ACM"},{"key":"e_1_2_9_40_1","doi-asserted-by":"crossref","unstructured":"AjeenaRKK YaqoobSJ.The integer sub\u2010decomposition method to improve the elliptic elgamal digital signature algorithm. Paper presented at: 2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT). IEEE;2017: 14\u201320.","DOI":"10.1109\/CRCSIT.2017.7965554"},{"key":"e_1_2_9_41_1","first-page":"109","article-title":"On the elliptic curve digital signature algorithm","volume":"8","author":"Liao HZ","year":"2006","journal-title":"Tunghai Sci"},{"key":"e_1_2_9_42_1","doi-asserted-by":"crossref","unstructured":"JunruH.The improved elliptic curve digital signature algorithm. Paper presented at: 2011 International Conference on Electronic and Mechanical Engineering and Information Technology (EMEIT) vol 1. IEEE;2011: 257\u2013259.","DOI":"10.1109\/EMEIT.2011.6022868"},{"key":"e_1_2_9_43_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJITST.2016.080406"},{"key":"e_1_2_9_44_1","article-title":"A new enhancement of elliptic curve digital signature algorithm","volume":"23","author":"Mehibel N","year":"2020","journal-title":"J Discret Math Sci Cryptogr"},{"key":"e_1_2_9_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-1885-6"},{"key":"e_1_2_9_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-015-9192-5"},{"key":"e_1_2_9_47_1","article-title":"An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach","author":"Khan AA","year":"2019","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"e_1_2_9_48_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1169"},{"key":"e_1_2_9_49_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJMOR.2016.073280"}],"container-title":["SECURITY AND PRIVACY"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spy2.148","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/spy2.148","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spy2.148","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T06:39:36Z","timestamp":1693636776000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spy2.148"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,27]]},"references-count":48,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["10.1002\/spy2.148"],"URL":"https:\/\/doi.org\/10.1002\/spy2.148","archive":["Portico"],"relation":{},"ISSN":["2475-6725","2475-6725"],"issn-type":[{"value":"2475-6725","type":"print"},{"value":"2475-6725","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,27]]},"assertion":[{"value":"2020-09-11","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-01-08","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-01-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}