{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T15:24:18Z","timestamp":1766157858982,"version":"3.37.3"},"reference-count":43,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2015,5,1]],"date-time":"2015-05-01T00:00:00Z","timestamp":1430438400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["MOST103-2221-E-018-022-MY2"],"award-info":[{"award-number":["MOST103-2221-E-018-022-MY2"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2015,5,1]]},"abstract":"<jats:p> With the rapid development in wireless communications and cloud computing technologies, clients (users) often use handheld mobile devices to access remote servers via open network channels. To provide authentication and confidentiality between clients and servers, a large number of ID-based authentication and key exchange (ID-AKE) protocols have been proposed for mobile client-server environments. However, most of the existing ID-AKE protocols adopt the precomputation technique so that they become vulnerable to the ephemeral-secret-leakage (ESL) attacks, in the sense that an adversary could use the ephemeral secrets to reveal the private keys of clients from the corresponding exchange messages. In the paper, we propose a new ESL-secure ID-AKE protocol for mobile client-server environments. We formally prove that the proposed protocol satisfies the security requirements of both mutual authentication and key exchange while resisting the ESL attacks. When compared with previously proposed ID-AKE protocols, our protocol has higher security and retains computational performance, since it requires no bilinear pairing operation for mobile clients. Finally, we mention the possibility of adopting our protocol as an authentication method of the extensible authentication protocol (EAP) for wireless networks. <\/jats:p>","DOI":"10.1155\/2015\/898716","type":"journal-article","created":{"date-parts":[[2015,5,21]],"date-time":"2015-05-21T21:02:54Z","timestamp":1432242174000},"page":"898716","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":9,"title":["A Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile Devices"],"prefix":"10.1177","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0860-7766","authenticated-orcid":false,"given":"Yuh-Min","family":"Tseng","sequence":"first","affiliation":[{"name":"Department of Mathematics, National Changhua University of Education, Jin-De Campus, Changhua City 500, Taiwan"}]},{"given":"Sen-Shan","family":"Huang","sequence":"additional","affiliation":[{"name":"Department of Mathematics, National Changhua University of Education, Jin-De Campus, Changhua City 500, Taiwan"}]},{"given":"Tung-Tso","family":"Tsai","sequence":"additional","affiliation":[{"name":"Department of Mathematics, National Changhua University of Education, Jin-De Campus, Changhua City 500, Taiwan"}]},{"given":"Li","family":"Tseng","sequence":"additional","affiliation":[{"name":"Department of Mathematics, National Changhua University of Education, Jin-De Campus, Changhua City 500, Taiwan"}]}],"member":"179","published-online":{"date-parts":[[2015,5,21]]},"reference":[{"first-page":"22","volume-title":"Proceedings of the 2nd Workshop on Selected Areas in Cryptography (SAC '95)","author":"Menezes A.","key":"B1-2015-898716"},{"key":"B2-2015-898716","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_11"},{"key":"B3-2015-898716","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44987-6_28"},{"key":"B4-2015-898716","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"B5-2015-898716","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"B6-2015-898716","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"B7-2015-898716","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"key":"B8-2015-898716","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_7"},{"key":"B9-2015-898716","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_28"},{"key":"B10-2015-898716","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxr098"},{"key":"B11-2015-898716","doi-asserted-by":"publisher","DOI":"10.15388\/Informatica.2014.16"},{"key":"B12-2015-898716","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36288-6_2"},{"key":"B13-2015-898716","doi-asserted-by":"publisher","DOI":"10.1007\/11780656_18"},{"key":"B14-2015-898716","doi-asserted-by":"publisher","DOI":"10.1002\/sec.696"},{"key":"B15-2015-898716","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/e91-a.7.1828"},{"issue":"3","key":"B16-2015-898716","first-page":"915","volume":"27","author":"Wu T.-Y.","year":"2011","journal-title":"Journal of Information Science and Engineering"},{"key":"B17-2015-898716","doi-asserted-by":"publisher","DOI":"10.15388\/Informatica.2012.362"},{"key":"B18-2015-898716","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-012-0296-9"},{"key":"B19-2015-898716","doi-asserted-by":"publisher","DOI":"10.1049\/el:20020387"},{"key":"B20-2015-898716","doi-asserted-by":"publisher","DOI":"10.1049\/el:20030448"},{"first-page":"219","volume-title":"Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW '03)","author":"Chen L.","key":"B21-2015-898716"},{"key":"B22-2015-898716","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2003.12.092"},{"key":"B23-2015-898716","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-006-0011-9"},{"key":"B24-2015-898716","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46088-8_17"},{"key":"B25-2015-898716","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_17"},{"key":"B26-2015-898716","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.09.010"},{"first-page":"494","volume-title":"Proceedings of the 10th Australasian Conference on Information Security and Privacy (ACISP '05)","author":"Choi K. Y.","key":"B27-2015-898716"},{"key":"B28-2015-898716","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.12.008"},{"key":"B29-2015-898716","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxp083"},{"key":"B30-2015-898716","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.01.002"},{"key":"B31-2015-898716","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.06.061"},{"key":"B32-2015-898716","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2011.01.001"},{"key":"B33-2015-898716","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1268"},{"first-page":"1","volume-title":"Proceedings of the 1st International Conference on Provable Security (ProvSec '07)","author":"LaMacchia B.","key":"B34-2015-898716"},{"key":"B35-2015-898716","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2011.03.001"},{"key":"B36-2015-898716","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-1968-8"},{"key":"B37-2015-898716","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxt116"},{"first-page":"62","volume-title":"Proceedings of the 1st ACM Conference on Computer and Communications Security","author":"Bellare M.","key":"B38-2015-898716"},{"key":"B39-2015-898716","doi-asserted-by":"publisher","DOI":"10.1007\/S001450010003"},{"key":"B42-2015-898716","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2007.11.014"},{"key":"B43-2015-898716","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.02.021"},{"key":"B44-2015-898716","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_11"},{"key":"B45-2015-898716","doi-asserted-by":"publisher","DOI":"10.1109\/INSS.2008.4610921"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/898716","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2015\/898716","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/898716","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,5]],"date-time":"2021-05-05T21:51:48Z","timestamp":1620251508000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2015\/898716"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,1]]},"references-count":43,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,5,1]]}},"alternative-id":["10.1155\/2015\/898716"],"URL":"https:\/\/doi.org\/10.1155\/2015\/898716","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2015,5,1]]}}}