메뉴 건너뛰기




Volumn 4809 LNCS, Issue , 2007, Pages 728-744

A simple and efficient key exchange scheme against the smart card loss problem

Author keywords

Authentication; Hash function; Key exchange; Password; Smart card

Indexed keywords

CRYPTOGRAPHY; INTELLIGENT SYSTEMS; PROBLEM SOLVING; SMART CARDS; UBIQUITOUS COMPUTING; USER INTERFACES;

EID: 38149099184     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-77090-9_67     Document Type: Conference Paper
Times cited : (7)

References (31)
  • 2
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated and key exchange secure against dictionary attacks
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated and key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 3
    • 24944584156 scopus 로고    scopus 로고
    • Biham, E., Chen, R., Joux, A., Carribault, P., Jalby, W., Lemuet, C.: Collisions in SHA-0 and reduced SHA-1. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, 3494, pp. 36-57. Springer, Heidelberg (2005)
    • Biham, E., Chen, R., Joux, A., Carribault, P., Jalby, W., Lemuet, C.: Collisions in SHA-0 and reduced SHA-1. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 36-57. Springer, Heidelberg (2005)
  • 6
    • 25844495474 scopus 로고    scopus 로고
    • An efficient nonce-based authentication with key agreement
    • Chen, Y.-C., Yeh, L.-Y.: An efficient nonce-based authentication with key agreement. Applied Mathematics and Computation 169(2), 982-994 (2005)
    • (2005) Applied Mathematics and Computation , vol.169 , Issue.2 , pp. 982-994
    • Chen, Y.-C.1    Yeh, L.-Y.2
  • 7
    • 12844274508 scopus 로고    scopus 로고
    • Note on robust and simple authentication protocol
    • Chien, H.-Y., Wang, R.-C., Yang, C.-C.: Note on robust and simple authentication protocol. The Computer Journal 48(1), 27-29 (2005)
    • (2005) The Computer Journal , vol.48 , Issue.1 , pp. 27-29
    • Chien, H.-Y.1    Wang, R.-C.2    Yang, C.-C.3
  • 9
    • 0002805220 scopus 로고
    • Undetected on-line password guessing attacks
    • Ding, Y., Horster, P.: Undetected on-line password guessing attacks. ACM Operating Systems Review 29(4), 77-86 (1995)
    • (1995) ACM Operating Systems Review , vol.29 , Issue.4 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 10
    • 38149047216 scopus 로고
    • A high-speed DES implement for network applications
    • Brickell, E.F, ed, CRYPTO 1992, Springer, Heidelberg
    • Eberle, H.: A high-speed DES implement for network applications. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 527-545. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.740 , pp. 527-545
    • Eberle, H.1
  • 11
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. on Information Theory IT-31, 469-472 (1985)
    • (1985) IEEE Trans. on Information Theory , vol.IT-31 , pp. 469-472
    • ElGamal, T.1
  • 12
    • 28044451335 scopus 로고    scopus 로고
    • Robust remote authentication scheme with smart cards
    • Fan, C.-I., Chan, Y.-C., Zhang, Z.-K.: Robust remote authentication scheme with smart cards. Computers & Security 24, 619-628 (2005)
    • (2005) Computers & Security , vol.24 , pp. 619-628
    • Fan, C.-I.1    Chan, Y.-C.2    Zhang, Z.-K.3
  • 13
    • 0030123246 scopus 로고    scopus 로고
    • Efficient blind signature schemes based on quadratic residues
    • Fan, C.-I., Lei, C.-L.: Efficient blind signature schemes based on quadratic residues. IEE Electronics Letters 32(9), 811-813 (1996)
    • (1996) IEE Electronics Letters , vol.32 , Issue.9 , pp. 811-813
    • Fan, C.-I.1    Lei, C.-L.2
  • 15
    • 1942455353 scopus 로고    scopus 로고
    • Efficient multi-server password authenticated key agreement using smart cards
    • Juang, W.-S.: Efficient multi-server password authenticated key agreement using smart cards. IEEE Trans. on Consumer Electronics 50(1), 251-255 (2004)
    • (2004) IEEE Trans. on Consumer Electronics , vol.50 , Issue.1 , pp. 251-255
    • Juang, W.-S.1
  • 16
    • 1542335451 scopus 로고    scopus 로고
    • Efficient password authenticated key agreement using smart cards
    • Juang, W.-S.: Efficient password authenticated key agreement using smart cards. Computers & Security 23, 167-173 (2004)
    • (2004) Computers & Security , vol.23 , pp. 167-173
    • Juang, W.-S.1
  • 17
    • 4043095653 scopus 로고    scopus 로고
    • Efficient three-party key exchange using smart cards
    • Juang, W.-S.: Efficient three-party key exchange using smart cards. IEEE Trans. on Consumer Electronics 50(2), 619-624 (2004)
    • (2004) IEEE Trans. on Consumer Electronics , vol.50 , Issue.2 , pp. 619-624
    • Juang, W.-S.1
  • 18
    • 33745904732 scopus 로고    scopus 로고
    • Efficient User Authentication and Key Agreement in Ubiquitous Computing
    • Gavrilova, M, Gervasi, O, Kumar, V, Tan, C.J.K, Taniar, D, Laganà, A, Mun, Y, Choo, H, eds, ICCSA 2006, Springer, Heidelberg
    • Juang, W.-S.: Efficient User Authentication and Key Agreement in Ubiquitous Computing. In: Gavrilova, M., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganà, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3983, pp. 396-405. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3983 , pp. 396-405
    • Juang, W.-S.1
  • 19
    • 24144494609 scopus 로고    scopus 로고
    • Impersonation attack on a dynamic ID-based remote user authentication scheme using smart cards
    • Ku, W.-C., Chang, S.-T.: Impersonation attack on a dynamic ID-based remote user authentication scheme using smart cards. IEICE Trans. on communications E88-B(5), 2165-2167 (2005)
    • (2005) IEICE Trans. on communications , vol.E88-B , Issue.5 , pp. 2165-2167
    • Ku, W.-C.1    Chang, S.-T.2
  • 20
    • 4344596953 scopus 로고    scopus 로고
    • Stolen-verifier attack on an efficient smart card-based one-time password authentication scheme
    • Ku, W.-C., Tsai, H.-C., Tsaur, M.-J.: Stolen-verifier attack on an efficient smart card-based one-time password authentication scheme. IEICE Trans. on communications E87-B(8), 2374-2376 (2004)
    • (2004) IEICE Trans. on communications , vol.E87-B , Issue.8 , pp. 2374-2376
    • Ku, W.-C.1    Tsai, H.-C.2    Tsaur, M.-J.3
  • 21
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24, 770-772 (1981)
    • (1981) Communications of the ACM , vol.24 , pp. 770-772
    • Lamport, L.1
  • 22
    • 33646477537 scopus 로고    scopus 로고
    • An efficient and complete remote user authentication scheme using smart cards
    • Liaw, H.-T., Lin, J.-F., Wu, W.-C.: An efficient and complete remote user authentication scheme using smart cards. Mathematical and Computer Modelling 44, 223-228 (2006)
    • (2006) Mathematical and Computer Modelling , vol.44 , pp. 223-228
    • Liaw, H.-T.1    Lin, J.-F.2    Wu, W.-C.3
  • 23
    • 33845565699 scopus 로고    scopus 로고
    • Impersonation attack on two-gene-relation password authentication protocol 2GR
    • Lin, C.-L., Hung, C.-P.: Impersonation attack on two-gene-relation password authentication protocol 2GR. IEICE Trans. on communications E89-B(12), 3425-3427 (2006)
    • (2006) IEICE Trans. on communications , vol.E89-B , Issue.12 , pp. 3425-3427
    • Lin, C.-L.1    Hung, C.-P.2
  • 25
    • 84937461306 scopus 로고
    • One-way hash functions and DES
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Merkle, R.C.: One-way hash functions and DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 428-446. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 428-446
    • Merkle, R.C.1
  • 26
    • 33144456748 scopus 로고    scopus 로고
    • Secure remote user access over insecure networks
    • Peyravian, M., Jeffries, C.: Secure remote user access over insecure networks. Computers Communications 29, 660-667 (2006)
    • (2006) Computers Communications , vol.29 , pp. 660-667
    • Peyravian, M.1    Jeffries, C.2
  • 27
    • 0017930809 scopus 로고
    • A method for obtaining digital signature and public key cryptosystems
    • Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signature and public key cryptosystems. Communications of the ACM 21, 120-126 (1978)
    • (1978) Communications of the ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 28
    • 32444434862 scopus 로고    scopus 로고
    • Efficient remote mutual authentication and key agreement
    • Shieh, W.-G., Wang, J.-M.: Efficient remote mutual authentication and key agreement. Computers & Security 25, 72-77 (2006)
    • (2006) Computers & Security , vol.25 , pp. 72-77
    • Shieh, W.-G.1    Wang, J.-M.2
  • 29
    • 0142007776 scopus 로고    scopus 로고
    • Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme
    • Ku, W.-C., Chen, C.-M., Lee, H.-L.: Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme. IEICE Trans. on Communications E86-B, 1682-1684 (2003)
    • (2003) IEICE Trans. on Communications , vol.E86-B , pp. 1682-1684
    • Ku, W.-C.1    Chen, C.-M.2    Lee, H.-L.3
  • 30
    • 1942423677 scopus 로고    scopus 로고
    • Weakness and improvement of an efficient password based remote user authentication scheme using smart cards
    • Ku, W.-C., Chen, S.-M.: Weakness and improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Trans. on Consumer Electronics 50(1), 204-207 (2004)
    • (2004) IEEE Trans. on Consumer Electronics , vol.50 , Issue.1 , pp. 204-207
    • Ku, W.-C.1    Chen, S.-M.2
  • 31
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart card security under the threat of power analysis attacks
    • Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart card security under the threat of power analysis attacks. IEEE Trans. on Computers 51(5), 541-552 (2002)
    • (2002) IEEE Trans. on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.