메뉴 건너뛰기




Volumn 19, Issue 2, 2008, Pages 285-302

A pairing-based user authentication scheme for wireless clients with smart cards

Author keywords

Authentication; Bilinear pairing; Identity based; Smart card; Wireless client

Indexed keywords


EID: 47949104161     PISSN: 08684952     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (77)

References (32)
  • 1
    • 1542647564 scopus 로고    scopus 로고
    • A remote user authentication scheme using smart cards with forward secrecy
    • Awasthi, A.K., and S. Lal (2003). A remote user authentication scheme using smart cards with forward secrecy. IEEE Trans. on Consumer Electron., 49(4), 1246-1248.
    • (2003) IEEE Trans. on Consumer Electron , vol.49 , Issue.4 , pp. 1246-1248
    • Awasthi, A.K.1    Lal, S.2
  • 4
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based Encryption from the Weil pairing
    • Advances in Cryptology-CRYPTO 2001
    • Boneh, D., and M. Franklin (2001). Identity-based Encryption from the Weil pairing. In Advances in Cryptology-CRYPTO 2001, LNCS, vol. 2139. pp. 213-229.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 5
    • 0037623983 scopus 로고    scopus 로고
    • Identity based encryption from the Weil pairing
    • Boneh, D., and M. Franklin (2003). Identity based encryption from the Weil pairing. SIAM J. of Computing, 32(3), 586-615.
    • (2003) SIAM J. of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 6
    • 35248844436 scopus 로고    scopus 로고
    • An identity-based signature from gap Diffie-Hellman groups
    • PKC 2003
    • Cha, J.C., and J.H. Cheon (2003). An identity-based signature from gap Diffie-Hellman groups. In PKC 2003, LNCS, vol. 2567. pp. 18-30.
    • (2003) LNCS , vol.2567 , pp. 18-30
    • Cha, J.C.1    Cheon, J.H.2
  • 8
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication: Smart card
    • Chien, H.Y., J.K. Jan and Y.M. Tseng (2002). An efficient and practical solution to remote authentication: smart card. Computers and Security, 21(4), 372-375.
    • (2002) Computers and Security , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.Y.1    Jan, J.K.2    Tseng, Y.M.3
  • 10
    • 33744776672 scopus 로고    scopus 로고
    • A novel remote user authentication scheme using bilinear pairings
    • Das, M.L., A. Saxena, V.P. Gulati and D.B. Phatak (2006). A novel remote user authentication scheme using bilinear pairings. Computers and Security, 25(3), 184-189.
    • (2006) Computers and Security , vol.25 , Issue.3 , pp. 184-189
    • Das, M.L.1    Saxena, A.2    Gulati, V.P.3    Phatak, D.B.4
  • 11
    • 47949101954 scopus 로고    scopus 로고
    • An improved remote user authentication scheme with smart cards using bilinear pairings
    • Available
    • Giri, D., and P.D. Srivastava (2006). An improved remote user authentication scheme with smart cards using bilinear pairings. In Cryptology ePrint Archive. Available: http://eprint.iacr.org/2006/274.pdf
    • (2006) Cryptology ePrint Archive
    • Giri, D.1    Srivastava, P.D.2
  • 12
    • 47949122508 scopus 로고    scopus 로고
    • Cryptanalysis of recently proposed Remote User Authentication Schemes
    • Available
    • Goriparthi, T., M.L. Das, A. Negi and A. Saxena (2006). Cryptanalysis of recently proposed Remote User Authentication Schemes. In Cryptology ePrint Archive. Available: http://eprint.iacr.org/2006/028.pdf
    • (2006) Cryptology ePrint Archive
    • Goriparthi, T.1    Das, M.L.2    Negi, A.3    Saxena, A.4
  • 16
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentication scheme using smart cards
    • Hwang, M.S., and L.H. Li (2000). A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron., 46(1), 28-30.
    • (2000) IEEE Trans. Consum. Electron , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.S.1    Li, L.H.2
  • 17
    • 0002063278 scopus 로고    scopus 로고
    • Paramita wisdom: Password authentication scheme without verification tables
    • Jan, J.K., and Y.Y. Chen (1998). Paramita wisdom: password authentication scheme without verification tables. Journal of Systems and Software, 42, 45-47.
    • (1998) Journal of Systems and Software , vol.42 , pp. 45-47
    • Jan, J.K.1    Chen, Y.Y.2
  • 18
    • 24144494609 scopus 로고    scopus 로고
    • Ku, W.C., and S.T. Chang (2005). Impersonation attack on a dynamic id-based remote user authentication scheme using smart cards. IEICE Transactions on Communications, E88-B 5(5), 2165-2167.
    • Ku, W.C., and S.T. Chang (2005). Impersonation attack on a dynamic id-based remote user authentication scheme using smart cards. IEICE Transactions on Communications, E88-B 5(5), 2165-2167.
  • 19
    • 33845214903 scopus 로고    scopus 로고
    • Cryptanalysis of a flexible remote user authentication scheme using smart cards
    • Ku, W.C., and S.M. Chen (2005). Cryptanalysis of a flexible remote user authentication scheme using smart cards. ACM Operating Systems Review, 39(1), 90-96.
    • (2005) ACM Operating Systems Review , vol.39 , Issue.1 , pp. 90-96
    • Ku, W.C.1    Chen, S.M.2
  • 20
    • 33646469746 scopus 로고    scopus 로고
    • Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme
    • Ku, W.C., M.H. Chiang and S.T. Chang (2005). Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme. ACM Operating Systems Review, 39(1), 85-89.
    • (2005) ACM Operating Systems Review , vol.39 , Issue.1 , pp. 85-89
    • Ku, W.C.1    Chiang, M.H.2    Chang, S.T.3
  • 21
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport, L. (1981). Password authentication with insecure communication. Commun. of ACM, 24, 770-772.
    • (1981) Commun. of ACM , vol.24 , pp. 770-772
    • Lamport, L.1
  • 22
    • 33646477537 scopus 로고    scopus 로고
    • An efficient and complete remote user authentication scheme using smart cards
    • Liaw, H.T., J.F. Lin and W.C. Wu (2006). An efficient and complete remote user authentication scheme using smart cards. Mathematical and Computer Modelling, 44, 223-228.
    • (2006) Mathematical and Computer Modelling , vol.44 , pp. 223-228
    • Liaw, H.T.1    Lin, J.F.2    Wu, W.C.3
  • 23
    • 24144458508 scopus 로고    scopus 로고
    • A new two-party identity-based authenticated key agreement
    • Proceedings of CT-RSA 2005
    • McCullagh, N., and P.S.L.M. Barreto (2005). A new two-party identity-based authenticated key agreement. In Proceedings of CT-RSA 2005, LNCS, vol. 3376. pp. 262-274.
    • (2005) LNCS , vol.3376 , pp. 262-274
    • McCullagh, N.1    Barreto, P.S.L.M.2
  • 24
    • 85041782014 scopus 로고    scopus 로고
    • NIST/NSA FIPS 180-2 (2005). Secure Hash Standard (SHS). NIST/NSA, Gaithersburg, MD, USA.
    • NIST/NSA FIPS 180-2 (2005). Secure Hash Standard (SHS). NIST/NSA, Gaithersburg, MD, USA.
  • 25
    • 0037194815 scopus 로고    scopus 로고
    • ID-based signatures from pairings on elliptic curves
    • Paterson, K. (2002). ID-based signatures from pairings on elliptic curves. Electronics Letters, 38(18), 1025-1026.
    • (2002) Electronics Letters , vol.38 , Issue.18 , pp. 1025-1026
    • Paterson, K.1
  • 26
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • Pointcheval, D., and J. Stern (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptography, 13, 361-396.
    • (2000) Journal of Cryptography , vol.13 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2
  • 28
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Advances in Cryptology, Crypto '84
    • Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Advances in Cryptology - Crypto '84, LNCS, vol. 196. pp. 47-53.
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 29
    • 24144479376 scopus 로고    scopus 로고
    • Computing the tate pairing
    • Springer-Verlag. pp
    • Scott, M. (2005). Computing the tate pairing. In CT-RSA, LNCS, vol. 3376. Springer-Verlag. pp. 293-304.
    • (2005) CT-RSA, LNCS , vol.3376 , pp. 293-304
    • Scott, M.1
  • 30
    • 34548112540 scopus 로고    scopus 로고
    • Implementing cryptographic pairings on smartcards
    • Available
    • Scott, M., N. Costigan and W. Abdulwahab (2006). Implementing cryptographic pairings on smartcards. In Cryptology ePrint Archive. Available: http://eprint.iacr.org/2006/144.pdf
    • (2006) Cryptology ePrint Archive
    • Scott, M.1    Costigan, N.2    Abdulwahab, W.3
  • 31
    • 33751395122 scopus 로고    scopus 로고
    • GPRS/UMTS-aided authentication protocol for wireless LANs
    • Tseng, Y.M. (2006). GPRS/UMTS-aided authentication protocol for wireless LANs. IEE Proceedings - Communications, 153(6), 810-817.
    • (2006) IEE Proceedings - Communications , vol.153 , Issue.6 , pp. 810-817
    • Tseng, Y.M.1
  • 32
    • 34249876364 scopus 로고    scopus 로고
    • A resource-constrained group key agreement protocol for imbalanced wireless networks
    • Tseng, Y.M. (2007). A resource-constrained group key agreement protocol for imbalanced wireless networks. Computers & Security, 26(4), 331-337.
    • (2007) Computers & Security , vol.26 , Issue.4 , pp. 331-337
    • Tseng, Y.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.