2015
DOI: 10.1007/s11042-015-2911-z
|View full text |Cite
|
Sign up to set email alerts
|

Design of a password-based authenticated key exchange protocol for SIP

Abstract: The Session Initiation Protocol (SIP) is a signaling communications protocol, which has been chosen for controlling multimedia communication in 3G mobile networks. In recent years, password-based authenticated key exchange protocols are designed to provide strong authentication for SIP. In this paper, we address this problem in two-party setting where the user and server try to authenticate each other, and establish a session key using a shared password. We aim to propose a secure and anonymous authenticated k… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 40 publications
(56 reference statements)
0
5
0
Order By: Relevance
“…Table summarizes the communication overheads needed by the proposed scheme and other related existing ECC‐based schemes. It is also clear that the proposed scheme also needs the minimum communication cost as compared with all other existing schemes except the scheme of Mishra , which has the same cost as our scheme.…”
Section: Performance Comparisonmentioning
confidence: 70%
See 4 more Smart Citations
“…Table summarizes the communication overheads needed by the proposed scheme and other related existing ECC‐based schemes. It is also clear that the proposed scheme also needs the minimum communication cost as compared with all other existing schemes except the scheme of Mishra , which has the same cost as our scheme.…”
Section: Performance Comparisonmentioning
confidence: 70%
“…Table summarizes the computation overheads required by the proposed scheme and other related ECC‐based schemes, such as the schemes of Zhang et al , Tu et al , Farash , Yeh et al , Jiang et al , and Mishra . In our scheme, the user U i and the server S need the computation overhead of 3 T h + 3 T e c m (≈6.6849ms) and 4 T h + 3 T e c m (≈6.6872ms), respectively, and the total cost becomes 7 T h + 6 T e c m (≈13.3721ms).…”
Section: Performance Comparisonmentioning
confidence: 99%
See 3 more Smart Citations