메뉴 건너뛰기




Volumn 25, Issue 3, 2006, Pages 184-189

A novel remote user authentication scheme using bilinear pairings

Author keywords

Authentication; Bilinear pairings; Password; Smart card; Timestamp

Indexed keywords

ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; SECURITY SYSTEMS; SMART CARDS; SYSTEMS ANALYSIS; USER INTERFACES;

EID: 33744776672     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2005.09.002     Document Type: Article
Times cited : (114)

References (21)
  • 1
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems
    • Advances in cryptology - Crypto'02, Springer-Verlag
    • Barreto P.S.L.M., Kim H.Y., Lynn B., and Scott M. Efficient algorithms for pairing-based cryptosystems. Advances in cryptology - Crypto'02. LNCS vol. 2442 (2002), Springer-Verlag 354-368
    • (2002) LNCS , vol.2442 , pp. 354-368
    • Barreto, P.S.L.M.1    Kim, H.Y.2    Lynn, B.3    Scott, M.4
  • 2
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Advances in cryptology - Crypto'01, Springer-Verlag
    • Boneh D., and Franklin M. Identity-based encryption from the Weil pairing. Advances in cryptology - Crypto'01. LNCS vol. 2139 (2001), Springer-Verlag 213-229
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 3
    • 0026153410 scopus 로고
    • Remote password authentication with smart cards
    • Chang C.C., and Wu T.C. Remote password authentication with smart cards. IEE Proceedings - E 138 3 (1993) 165-168
    • (1993) IEE Proceedings - E , vol.138 , Issue.3 , pp. 165-168
    • Chang, C.C.1    Wu, T.C.2
  • 4
    • 0028405583 scopus 로고
    • A remote password authentication scheme based upon ElGamal's signature scheme
    • Chang C.C., and Liao W.Y. A remote password authentication scheme based upon ElGamal's signature scheme. Computers & Security 13 2 (1994) 137-144
    • (1994) Computers & Security , vol.13 , Issue.2 , pp. 137-144
    • Chang, C.C.1    Liao, W.Y.2
  • 5
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • Cryptography and coding, Springer-Verlag
    • Cocks C. An identity based encryption scheme based on quadratic residues. Cryptography and coding. LNCS vol. 2260 (2001), Springer-Verlag 360-363
    • (2001) LNCS , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 6
    • 84874800178 scopus 로고
    • A public key cryptosystem and signature scheme based on the discrete logarithms
    • ElGamal T. A public key cryptosystem and signature scheme based on the discrete logarithms. IEEE Transaction on Information Theory 31 4 (1985) 469-472
    • (1985) IEEE Transaction on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 7
    • 84968502759 scopus 로고
    • A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
    • Frey G., and Ruck H. A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves. Mathematics of Computation 62 (1994) 865-874
    • (1994) Mathematics of Computation , vol.62 , pp. 865-874
    • Frey, G.1    Ruck, H.2
  • 8
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • Selected areas in cryptography'02, Springer-Verlag
    • Hess F. Efficient identity based signature schemes based on pairings. Selected areas in cryptography'02. LNCS vol. 2595 (2003), Springer-Verlag 310-324
    • (2003) LNCS , vol.2595 , pp. 310-324
    • Hess, F.1
  • 9
    • 0141642166 scopus 로고    scopus 로고
    • On the security of some password authentication protocols
    • Hsieh B.T., Sun H.M., and Hwang T. On the security of some password authentication protocols. Informatica 14 2 (2003) 195-204
    • (2003) Informatica , vol.14 , Issue.2 , pp. 195-204
    • Hsieh, B.T.1    Sun, H.M.2    Hwang, T.3
  • 10
    • 0036556279 scopus 로고    scopus 로고
    • Improvement on Peyravian-Zunic's password authentication schemes
    • Hwang J.J., and Yeh T.C. Improvement on Peyravian-Zunic's password authentication schemes. IEICE Transactions on Communications E85-B 4 (2002) 823-825
    • (2002) IEICE Transactions on Communications , vol.E85-B , Issue.4 , pp. 823-825
    • Hwang, J.J.1    Yeh, T.C.2
  • 12
    • 33744757940 scopus 로고    scopus 로고
    • Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme
    • Ku W.C., Chen C.M., and Lee H.L. Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme. ACM Operating Systems Review 37 4 (2003) 9-25
    • (2003) ACM Operating Systems Review , vol.37 , Issue.4 , pp. 9-25
    • Ku, W.C.1    Chen, C.M.2    Lee, H.L.3
  • 13
    • 33744725812 scopus 로고    scopus 로고
    • A hash-based strong-password authentication scheme without using smart cards
    • Ku W.C. A hash-based strong-password authentication scheme without using smart cards. ACM Operating Systems Review 38 1 (2004) 29-34
    • (2004) ACM Operating Systems Review , vol.38 , Issue.1 , pp. 29-34
    • Ku, W.C.1
  • 14
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport L. Password authentication with insecure communication. Communications of the ACM 24 11 (1981) 770-772
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 15
    • 0041698517 scopus 로고    scopus 로고
    • A remote user authentication scheme using hash functions
    • Lee C.C., Li L.H., and Hwang M.S. A remote user authentication scheme using hash functions. ACM Operating Systems Review 36 4 (2002) 23-29
    • (2002) ACM Operating Systems Review , vol.36 , Issue.4 , pp. 23-29
    • Lee, C.C.1    Li, L.H.2    Hwang, M.S.3
  • 18
    • 0033704170 scopus 로고    scopus 로고
    • Methods for protecting password transmission
    • Peyravian M., and Zunic N. Methods for protecting password transmission. Computers & Security 19 5 (2000) 466-469
    • (2000) Computers & Security , vol.19 , Issue.5 , pp. 466-469
    • Peyravian, M.1    Zunic, N.2
  • 19
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Advances in cryptology - Crypto'84, Springer-Verlag
    • Shamir A. Identity-based cryptosystems and signature schemes. Advances in cryptology - Crypto'84. LNCS vol. 196 (1984), Springer-Verlag 47-53
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 21
    • 0032137355 scopus 로고    scopus 로고
    • A password authentication methods for contents communication on the Internet
    • Shimizu A., Horioka T., and Inagaki H. A password authentication methods for contents communication on the Internet. IEICE Transactions on Communications E81-B 8 (1998) 1666-1673
    • (1998) IEICE Transactions on Communications , vol.E81-B , Issue.8 , pp. 1666-1673
    • Shimizu, A.1    Horioka, T.2    Inagaki, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.