{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:01Z","timestamp":1740141781009,"version":"3.37.3"},"reference-count":12,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2014,5,1]],"date-time":"2014-05-01T00:00:00Z","timestamp":1398902400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2011-0029925"],"award-info":[{"award-number":["2011-0029925"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2014,5,1]]},"abstract":"<jats:p> For enhancing the security of ubiquitous communication, we have to consider three keywords: mobility, wireless, and low computing capability. In this paper, we study one of suitable security protocols for the ubiquitous communication environment. We discuss RSA-based password-authenticated key exchange (RSA-PAKE) protocols for imbalanced wireless networks where a party uses a low-power device to communicate with another party equipped with a powerful computing device. For imbalanced wireless network applications, it is important to reduce the cost of communication for a low-power device even though the cost for powerful devices is increasing. The most power-consuming operation in RSA-PAKE protocols is the reliability test of unauthorized RSA public keys. Hence, it is important to design an efficient reliability test method to construct an efficient RSA-PAKE protocol. In this paper, we propose a new reliability test technique and design a provably secure RSA-PAKE protocol using the technique. Our protocol is suitable for securing the communications conducted over imbalanced wireless networks since the operations computed by one communicating party are efficient enough to be implemented on most low-power devices such as mobile phones and PDAs. The cost of a low-power device is reduced by 84.25% compared with CEKEP, the most efficient RSA-PAKE protocol. We prove the security of our protocol under a firmly formalized security model. <\/jats:p>","DOI":"10.1155\/2014\/125309","type":"journal-article","created":{"date-parts":[[2014,5,29]],"date-time":"2014-05-29T21:02:38Z","timestamp":1401397358000},"page":"125309","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["Practical RSA-PAKE for Low-Power Device in Imbalanced Wireless Networks"],"prefix":"10.1177","volume":"10","author":[{"given":"Taek-Young","family":"Youn","sequence":"first","affiliation":[{"name":"Electronics and Telecommunications Research Institute (ETRI), Daejeon, Republic of Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sewon","family":"Lee","sequence":"additional","affiliation":[{"name":"Center for Information Security Technologies, Korea University, Seoul, Republic of Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Seok Hie","family":"Hong","sequence":"additional","affiliation":[{"name":"Center for Information Security Technologies, Korea University, Seoul, Republic of Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Young-Ho","family":"Park","sequence":"additional","affiliation":[{"name":"Department of Information Security, Sejong Cyber University, Seoul, Republic of Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"179","published-online":{"date-parts":[[2014,5,29]]},"reference":[{"key":"B1-2014-125309","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1007\/10958513_16","volume-title":"Proceedings of the 6th International Conference (ISC '03)","volume":"2851","author":"Bao F."},{"key":"B5-2014-125309","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-006-0431-8"},{"key":"B7-2014-125309","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44448-3_46"},{"key":"B8-2014-125309","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1007\/11967668_20","volume-title":"Proceedings of the Cryptographers' Track at the RSA Conference","volume":"4377","author":"Park S."},{"key":"B10-2014-125309","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1007\/978-3-540-24582-7_28","volume-title":"Proceedings of the 4th International Conference on Cryptology (INDOCRYPT '03)","volume":"2904","author":"Wong D. S."},{"key":"B14-2014-125309","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/978-3-540-30144-8_2","volume-title":"Proceedings of the 7th International Conference (ISC '04)","volume":"3225","author":"Zhang M."},{"key":"B15-2014-125309","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1007\/978-3-540-30539-2_17","volume-title":"Proceedings of the 10th International Conference on the Theory and Application of Cryptology and Information Security","volume":"3329","author":"Zhang M."},{"key":"B17-2014-125309","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1007\/3-540-45811-5_11","volume-title":"Proceedings of the 5th International Conference (ISC '02)","volume":"2433","author":"Zhu F."},{"key":"B3-2014-125309","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_11"},{"key":"B9-2014-125309","volume-title":"Elementary Number Theory and Its Applications","author":"Rosen K. H.","year":"2000","edition":"4"},{"key":"B11-2014-125309","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2008.06.002"},{"volume-title":"Handbook of Applied Cryptography","year":"1997","author":"Menezes A.","key":"B6-2014-125309"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2014\/125309","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2014\/125309","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2014\/125309","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T21:31:27Z","timestamp":1621200687000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2014\/125309"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,1]]},"references-count":12,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2014,5,1]]}},"alternative-id":["10.1155\/2014\/125309"],"URL":"https:\/\/doi.org\/10.1155\/2014\/125309","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2014,5,1]]}}}