Open Access iconOpen Access

ARTICLE

Heterogeneous User Authentication and Key Establishment Protocol for Client-Server Environment

Huihui Zhu1, Fei Tang2,*, Chunhua Jin3, Ping Wang1

1 School of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China
2 School of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China
3 Faculty of Computer and Software Engineering, Huaiyin Institute of Technology, Huai’an, 233003, China

* Corresponding Author: Fei Tang. Email: email

(This article belongs to the Special Issue: Privacy-Enhancing Technologies for Secure Data Cooperation and Circulation)

Computers, Materials & Continua 2026, 87(1), 23 https://doi.org/10.32604/cmc.2025.073550

Abstract

The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication. Although various authentication and key agreement protocols have been developed, current approaches are constrained by homogeneous cryptosystem frameworks, namely public key infrastructure (PKI), identity-based cryptography (IBC), or certificateless cryptography (CLC), each presenting limitations in client-server architectures. Specifically, PKI incurs certificate management overhead, IBC introduces key escrow risks, and CLC encounters cross-system interoperability challenges. To overcome these shortcomings, this study introduces a heterogeneous signcryption-based authentication and key agreement protocol that synergistically integrates IBC for client operations (eliminating PKI’s certificate dependency) with CLC for server implementation (mitigating IBC’s key escrow issue while preserving efficiency). Rigorous security analysis under the mBR (modified Bellare-Rogaway) model confirms the protocol’s resistance to adaptive chosen-ciphertext attacks. Quantitative comparisons demonstrate that the proposed protocol achieves 10.08%–71.34% lower communication overhead than existing schemes across multiple security levels (80-, 112-, and 128-bit) compared to existing protocols.

Keywords

User authentication; key establishment; client-server; heterogeneous; security

Cite This Article

APA Style
Zhu, H., Tang, F., Jin, C., Wang, P. (2026). Heterogeneous User Authentication and Key Establishment Protocol for Client-Server Environment. Computers, Materials & Continua, 87(1), 23. https://doi.org/10.32604/cmc.2025.073550
Vancouver Style
Zhu H, Tang F, Jin C, Wang P. Heterogeneous User Authentication and Key Establishment Protocol for Client-Server Environment. Comput Mater Contin. 2026;87(1):23. https://doi.org/10.32604/cmc.2025.073550
IEEE Style
H. Zhu, F. Tang, C. Jin, and P. Wang, “Heterogeneous User Authentication and Key Establishment Protocol for Client-Server Environment,” Comput. Mater. Contin., vol. 87, no. 1, pp. 23, 2026. https://doi.org/10.32604/cmc.2025.073550



cc Copyright © 2026 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 462

    View

  • 125

    Download

  • 0

    Like

Share Link