메뉴 건너뛰기




Volumn 58, Issue 7, 2009, Pages 3508-3517

Identity-based anonymous remote authentication for value-added services in mobile networks

Author keywords

Anonymity; Identity based; Nonrepudiation; Pairing; Remote authentication

Indexed keywords

ANONYMITY; IDENTITY-BASED; NONREPUDIATION; PAIRING; REMOTE AUTHENTICATION;

EID: 69549116775     PISSN: 00189545     EISSN: None     Source Type: Journal    
DOI: 10.1109/TVT.2009.2012389     Document Type: Article
Times cited : (54)

References (32)
  • 1
    • 0036505541 scopus 로고    scopus 로고
    • Authentication protocols for mobile network environment value-added services
    • Mar
    • G. Horn, K. M. Martin, and C. J. Mitchell, "Authentication protocols for mobile network environment value-added services," IEEE Trans. Veh. Technol., vol. 51, no. 2, pp. 383-392, Mar. 2002.
    • (2002) IEEE Trans. Veh. Technol , vol.51 , Issue.2 , pp. 383-392
    • Horn, G.1    Martin, K.M.2    Mitchell, C.J.3
  • 2
    • 84956854891 scopus 로고    scopus 로고
    • Key establishment protocols for secure mobile communications: A selective survey
    • C. Boyd and A. Mathuria, "Key establishment protocols for secure mobile communications: A selective survey," in Proc. ACISP, 1998, vol. LNCS 1438, pp. 344-355.
    • (1998) Proc. ACISP , vol.LNCS , Issue.1438 , pp. 344-355
    • Boyd, C.1    Mathuria, A.2
  • 3
    • 33746373934 scopus 로고    scopus 로고
    • A novel privacy preserving authentication and access control scheme for pervasive computing environments
    • Jul
    • K. Ren, W. Lou, K. Kim, and R. Deng, "A novel privacy preserving authentication and access control scheme for pervasive computing environments," IEEE Trans. Veh. Technol., vol. 55, no. 4, pp. 1373-1384, Jul. 2006.
    • (2006) IEEE Trans. Veh. Technol , vol.55 , Issue.4 , pp. 1373-1384
    • Ren, K.1    Lou, W.2    Kim, K.3    Deng, R.4
  • 4
    • 33748622050 scopus 로고    scopus 로고
    • MASK: Anonymous on-demand routing in mobile ad hoc networks
    • Sep
    • Y. Zhang, W. Liu, W. Lou, and Y. Fang, "MASK: Anonymous on-demand routing in mobile ad hoc networks," IEEE Trans. Wireless Commun., vol. 5, no. 9, pp. 2376-2385, Sep. 2006.
    • (2006) IEEE Trans. Wireless Commun , vol.5 , Issue.9 , pp. 2376-2385
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 5
    • 33745619805 scopus 로고    scopus 로고
    • Identity-based key agreement with unilateral identity privacy using pairings
    • Z. Cheng, L. Chen, R. Comley, and Q. Tang, "Identity-based key agreement with unilateral identity privacy using pairings," in Proc. 2nd ISPEC, 2006, vol. LNCS 3903, pp. 202-213.
    • (2006) Proc. 2nd ISPEC , vol.LNCS 3903 , pp. 202-213
    • Cheng, Z.1    Chen, L.2    Comley, R.3    Tang, Q.4
  • 10
    • 11944251256 scopus 로고    scopus 로고
    • Anonymous wireless authentication on a portable cellular mobile system
    • Oct
    • S. J. Wang, "Anonymous wireless authentication on a portable cellular mobile system," IEEE Trans. Comput., vol. 53, no. 10, pp. 1317-1329, Oct. 2004.
    • (2004) IEEE Trans. Comput , vol.53 , Issue.10 , pp. 1317-1329
    • Wang, S.J.1
  • 11
    • 34547541295 scopus 로고    scopus 로고
    • A remote user authentication scheme using bilinear pairings and ECC
    • Z. Jia, Y. Zhang, H. Shao, Y. Lin, and J. Wang, "A remote user authentication scheme using bilinear pairings and ECC," in Proc. ISDA, 2006, vol. 2, pp. 1091-1094.
    • (2006) Proc. ISDA , vol.2 , pp. 1091-1094
    • Jia, Z.1    Zhang, Y.2    Shao, H.3    Lin, Y.4    Wang, J.5
  • 13
    • 48649086275 scopus 로고    scopus 로고
    • A secure and efficient scheme of remote user authentication based on bilinear pairings
    • Y. Liao and S. Wang, "A secure and efficient scheme of remote user authentication based on bilinear pairings," in Proc. TENCON, 2007, pp. 1-4.
    • (2007) Proc. TENCON , pp. 1-4
    • Liao, Y.1    Wang, S.2
  • 14
    • 38049001913 scopus 로고    scopus 로고
    • Novel remote user authentication scheme using bilinear pairings
    • C. Yang, W. Ma, and X. Wang, "Novel remote user authentication scheme using bilinear pairings," in Proc. ATC, 2007, vol. LNCS 4610, pp. 306-312.
    • (2007) Proc. ATC , vol.LNCS , Issue.4610 , pp. 306-312
    • Yang, C.1    Ma, W.2    Wang, X.3
  • 15
    • 37349011768 scopus 로고    scopus 로고
    • A mutual authentication and key exchange scheme from bilinear pairings for low power computing devices
    • Y. M. Tseng, T. Y. Wu, and J. D. Wu, "A mutual authentication and key exchange scheme from bilinear pairings for low power computing devices," in Proc. COMPAC, 2007, vol. 2, pp. 700-710.
    • (2007) Proc. COMPAC , vol.2 , pp. 700-710
    • Tseng, Y.M.1    Wu, T.Y.2    Wu, J.D.3
  • 16
    • 0001827537 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc. CRYPTO, 1984, pp. 47-53.
    • (1984) Proc. CRYPTO , pp. 47-53
    • Shamir, A.1
  • 17
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Proc. CRYPTO, 2001, vol. LNCS 2139, pp. 213-229.
    • (2001) Proc. CRYPTO , vol.LNCS 2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 18
    • 33751529199 scopus 로고    scopus 로고
    • Securing mobile ad hoc networks with certificateless public keys
    • Oct.-Dec
    • Y. Zhang, W. Liu, and Y. Fang, "Securing mobile ad hoc networks with certificateless public keys," IEEE Trans. Dependable Secure Comput. vol. 3, no. 4, pp. 386-399, Oct.-Dec. 2006.
    • (2006) IEEE Trans. Dependable Secure Comput , vol.3 , Issue.4 , pp. 386-399
    • Zhang, Y.1    Liu, W.2    Fang, Y.3
  • 19
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems
    • P. Barreto, H. Kim, B. Bynn, and M. Scott, "Efficient algorithms for pairing-based cryptosystems," in Proc. CRYPTO, 2002, pp. 354-368.
    • (2002) Proc. CRYPTO , pp. 354-368
    • Barreto, P.1    Kim, H.2    Bynn, B.3    Scott, M.4
  • 20
    • 0142156713 scopus 로고    scopus 로고
    • Variations of Diffie-Hellman problem
    • F. Bao, R. H. Deng, and H. Zhu, "Variations of Diffie-Hellman problem," in Proc. ICS, 2003, pp. 301-312.
    • (2003) Proc. ICS , pp. 301-312
    • Bao, F.1    Deng, R.H.2    Zhu, H.3
  • 21
    • 0037194815 scopus 로고    scopus 로고
    • ID-based signatures from pairings on elliptic curves
    • Aug
    • K. G. Paterson, "ID-based signatures from pairings on elliptic curves," Electron. Lett., vol. 38, no. 18, pp. 1025-1026, Aug. 2002.
    • (2002) Electron. Lett , vol.38 , Issue.18 , pp. 1025-1026
    • Paterson, K.G.1
  • 22
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • M. Bellare and P. Rogaway, "Random oracles are practical: A paradigm for designing efficient protocols," in Proc. 1st ACM Conf. Comput. Commun. Security, 1993, pp. 62-73.
    • (1993) Proc. 1st ACM Conf. Comput. Commun. Security , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 23
    • 1642409507 scopus 로고    scopus 로고
    • An identity-based signature from gap Diffie-Hellman groups
    • J. C. Cha and J. H. Cheon, "An identity-based signature from gap Diffie-Hellman groups," in Proc. PKC, 2003, pp. 18-30.
    • (2003) Proc. PKC , pp. 18-30
    • Cha, J.C.1    Cheon, J.H.2
  • 24
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • F. Hess, "Efficient identity based signature schemes based on pairings," in Proc. 9th Int. Workshop Sel. Area Cryptography, 2004, pp. 310-324.
    • (2004) Proc. 9th Int. Workshop Sel. Area Cryptography , pp. 310-324
    • Hess, F.1
  • 25
    • 0037330749 scopus 로고    scopus 로고
    • An identity-based signature scheme from the Weil pairing
    • Feb
    • X. Yi, "An identity-based signature scheme from the Weil pairing," IEEE Commun. Lett., vol. 7, no. 2, pp. 76-78, Feb. 2003.
    • (2003) IEEE Commun. Lett , vol.7 , Issue.2 , pp. 76-78
    • Yi, X.1
  • 26
    • 33646820668 scopus 로고    scopus 로고
    • Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
    • P. Barreto, B. Libert, N. McCullagh, and J. Quisquater, "Efficient and provably-secure identity-based signatures and signcryption from bilinear maps," in Proc. Asiacrypt, 2005, pp. 515-532.
    • (2005) Proc. Asiacrypt , pp. 515-532
    • Barreto, P.1    Libert, B.2    McCullagh, N.3    Quisquater, J.4
  • 27
    • 33745201299 scopus 로고    scopus 로고
    • Shamus Software Ltd, Online. Available
    • Shamus Software Ltd., Miracl library. Online. Available: http:// www.shamus.ie/index.php?page=home
    • Miracl library
  • 29
    • 36248988077 scopus 로고    scopus 로고
    • On broadcast authentication in wireless sensor networks
    • Nov
    • K. Ren, W. Lou, K. Zeng, and P. J. Moran, "On broadcast authentication in wireless sensor networks," IEEE Trans. Wireless Commun., vol. 6, no. 11, pp. 4136-4144, Nov. 2007.
    • (2007) IEEE Trans. Wireless Commun , vol.6 , Issue.11 , pp. 4136-4144
    • Ren, K.1    Lou, W.2    Zeng, K.3    Moran, P.J.4
  • 30
    • 0000901529 scopus 로고    scopus 로고
    • Security proofs for signature schemes
    • Dec
    • D. Pointcheval and J. Stern, "Security proofs for signature schemes," J. Cryptol., vol. 13, no. 3, pp. 361-396, Dec. 2000.
    • (2000) J. Cryptol , vol.13 , Issue.3 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2
  • 32
    • 84957001208 scopus 로고    scopus 로고
    • Entity authentication and authenticated key transport protocols employing asymmetric techniques
    • S. Blake-Wilson and A. Menezes, "Entity authentication and authenticated key transport protocols employing asymmetric techniques," in Proc. 5th Int. Workshop Security Protocols, 1997, vol. LNCS 1361, pp. 137-158.
    • (1997) Proc. 5th Int. Workshop Security Protocols , vol.LNCS 1361 , pp. 137-158
    • Blake-Wilson, S.1    Menezes, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.