메뉴 건너뛰기




Volumn 28, Issue 3-4, 2009, Pages 138-143

An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem

Author keywords

Cryptosystem; Elliptic curve; ID based; Key agreement; Mutual authentication

Indexed keywords

MOBILE COMPUTING; MOBILE DEVICES; PORTABLE EQUIPMENT; PUBLIC KEY CRYPTOGRAPHY;

EID: 63049116480     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2008.11.008     Document Type: Article
Times cited : (223)

References (16)
  • 2
    • 39049094066 scopus 로고    scopus 로고
    • IMBAS: identity-based multi-user broadcast authentication in wireless sensor networks
    • Cao X., Kou W., Dang L., and Zhao B. IMBAS: identity-based multi-user broadcast authentication in wireless sensor networks. Computer Communications 31 (2008) 659-667
    • (2008) Computer Communications , vol.31 , pp. 659-667
    • Cao, X.1    Kou, W.2    Dang, L.3    Zhao, B.4
  • 4
    • 10444220191 scopus 로고    scopus 로고
    • Efficient identity-based authenticated key agreement protocol from pairings
    • Choie Y.J., Jeong E., and Lee E. Efficient identity-based authenticated key agreement protocol from pairings. Applied Mathematics and Computation 162 (2005) 179-188
    • (2005) Applied Mathematics and Computation , vol.162 , pp. 179-188
    • Choie, Y.J.1    Jeong, E.2    Lee, E.3
  • 5
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information IT-31 (1985) 469-472
    • (1985) IEEE Transactions on Information , vol.IT-31 , pp. 469-472
    • ElGamal, T.1
  • 9
    • 0000112683 scopus 로고
    • Elliptic curve cryptosystem
    • Koblitz N. Elliptic curve cryptosystem. Mathematics of Computation 48 (1987) 203-209
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 11
    • 48649086275 scopus 로고    scopus 로고
    • A secure and efficient scheme of remote user authentication based on bilinear pairings
    • Liao YP, Wang SS. A secure and efficient scheme of remote user authentication based on bilinear pairings. In: Proceedings of 2007 IEEE region 10 conference; 2007. p. 1-4.
    • (2007) Proceedings of 2007 IEEE region 10 conference , pp. 1-4
    • Liao, Y.P.1    Wang, S.S.2
  • 12
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography
    • LNCS, Springer-Verlag
    • Miller V.S. Use of elliptic curves in cryptography. Advances in cryptology, proceedings of CRYPTO'85 vol. 218 (1986), LNCS, Springer-Verlag 417-426
    • (1986) Advances in cryptology, proceedings of CRYPTO'85 , vol.218 , pp. 417-426
    • Miller, V.S.1
  • 13
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Rivest R.L., Shamir A., and Adleman L. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM 21 2 (1978) 120-126
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 14
    • 85020598353 scopus 로고
    • Identity based cryptosystems and signature schemes
    • LNCS, Springer-Verlag
    • Shamir A. Identity based cryptosystems and signature schemes. Proceedings of CRYPTO' 84 (1984), LNCS, Springer-Verlag 47-53
    • (1984) Proceedings of CRYPTO' 84 , pp. 47-53
    • Shamir, A.1
  • 15
    • 28244469017 scopus 로고    scopus 로고
    • Analysis and improvement of authenticated key exchange protocol for sensor networks
    • Tian X., Wong D.S., and Zhu R.W. Analysis and improvement of authenticated key exchange protocol for sensor networks. IEEE Communications Letters 9 11 (2005) 970-972
    • (2005) IEEE Communications Letters , vol.9 , Issue.11 , pp. 970-972
    • Tian, X.1    Wong, D.S.2    Zhu, R.W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.