期刊文献+

DYNAMIC ID-BASED REMOTE USER MUTUAL AUTHENTICATION SCHEME WITH SMARTCARD USING ELLIPTIC CURVE CRYPTOGRAPHY

DYNAMIC ID-BASED REMOTE USER MUTUAL AUTHENTICATION SCHEME WITH SMARTCARD USING ELLIPTIC CURVE CRYPTOGRAPHY
下载PDF
导出
摘要 In the literature, several dynamic ID-based remote user mutual authentication schemes are implemented using password, smartcard and Elliptic Curve Cryptography(ECC), however, none of them provides resilience against different attacks. Therefore, there is a great need to design an efficient scheme for practical applications. In this paper, we proposed such a scheme in order to provide desired security attributes and computation efficiencies. Compared with other existing techniques, our scheme is more efficient and secured. In addition, our scheme is provably secure in the random oracle model under the hardness assumption of computational Diffie-Hellman problem. In the literature, several dynamic ID-based remote user mutual authentication schemes are implemented using password, smartcard and Elliptic Curve Cryptography (ECC), however, none of them provides resilience against different attacks. Therefore, there is a great need to design an efficient scheme for practical applications. In this paper, we proposed such a scheme in order to provide desired security attributes and computation efficiencies. Compared with other existing techniques, our scheme is more efficient and secured. In addition, our scheme is provably secure in the random oracle model under the hardness assumption of computational Diffie-Hellman problem.
出处 《Journal of Electronics(China)》 2014年第5期473-488,共16页 电子科学学刊(英文版)
关键词 Elliptic Curve Cryptography(ECC) Smartcard Mutual authentication PASSWORD Perfect forward secrecy Elliptic Curve Cryptography (ECC) Smartcard Mutual authentication Password Perfect forward secrecy
  • 相关文献

参考文献43

  • 1L. Lamport. Password authentication with insecure communication. Communications of the A CM, 24 (1981)11,770-772.
  • 2C. L. Lin and T. Hwang. A password authentication scheme with secure password updating. Computers and Security, 22(2003)1, 68-72.
  • 3E. J. Yoon, E. K. Ruy, and K. Y. Roo. A secure user authentication scheme using hash functions. A CM Operating Systems Review, 38(2004)2, 62-68.
  • 4M. Peyravian and C. Jeffries. Secure remote user access over insecure networks. Computer Communi- cations, 29(2006)5, 660-667.
  • 5M. S. Hwang and L. H. Li. A new remote user au- thentication scheme using smart cards. IEEE Trans- actions on Consumer Electronic, 46(2000)1, 28-30.
  • 6M. Kumar. New remote user authentication scheme with smart cards. IEEE Transactions on Consumer Electronics, 50(2004)2, 597-600.
  • 7R. Lu and Z. Cao. Efficient remote user authentica- tion scheme using smart card. Computer Networks, 49 (2005)4, 535-540.
  • 8H. T. Liaw, J. F. Lin, and W. C. Wu. An efficient and complete remote user authentication scheme using smart cards. Mathematical and Computer Modelling, 44(2006)I-2,223-228.
  • 9I. E. Liao, C. C. Lee, and M. S. Hwang. A password authentication scheme over insecure networks. Jour- nal of Computer and System Sciences, 72(2006)4,727- 740.
  • 10M. L. Das, A. Saxena, V. P. Gulati, and D. B. Phatak.A novel remote client authentication protocol using bilinear pairings. Computer and Security, 25(2006)3, 184-189.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部