An identity authentication protocol in online social networks

Lingjun Li, Xinxin Zhao, Guoliang Xue

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

Recent success of online social networks (OSNs) motivates the study of security issues in OSNs. A fundamental but challenging security issue in OSNs is to authenticate a friend's real identity. A solution to this issue will benefit a number of OSN security protocols. Existing solutions require users securely obtain some secret information from their friends before authentication takes place, which is not always possible in OSNs. In this paper, we propose a new authenticated key exchange protocol based on the exclusive secrets shared between friends. It provides identity authentication and key exchange in a plain setting, i.e., users do not need to securely exchange or distribute any information beforehand. The protocol is designed to work with low-entropy input information, because human beings are not good at dealing with a large amount of information. Another advantage of our protocol is its tolerance of input errors considering human error is always a possibility. We prove the security of the protocol in the universal composability (UC) framework and demonstrate its efficiency.

Original languageEnglish (US)
Title of host publicationASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security
Pages28-29
Number of pages2
DOIs
StatePublished - Dec 1 2012
Event7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2012 - Seoul, Korea, Republic of
Duration: May 2 2012May 4 2012

Publication series

NameASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security

Other

Other7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2012
CountryKorea, Republic of
CitySeoul
Period5/2/125/4/12

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Fingerprint Dive into the research topics of 'An identity authentication protocol in online social networks'. Together they form a unique fingerprint.

  • Cite this

    Li, L., Zhao, X., & Xue, G. (2012). An identity authentication protocol in online social networks. In ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security (pp. 28-29). (ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security). https://doi.org/10.1145/2414456.2414471