메뉴 건너뛰기




Volumn 54, Issue 9, 2010, Pages 1520-1530

An efficient user authentication and key exchange protocol for mobile client-server environment

Author keywords

Authentication; Bilinear pairing; Key exchange; Mobile device; Security

Indexed keywords

BILINEAR PAIRING; CERTIFICATE MANAGEMENT; ELLIPTIC CURVE; KEY-EXCHANGE; LOW-POWER COMPUTING; MOBILE CLIENT; MOBILE WIRELESS NETWORK; MUTUAL AUTHENTICATION; PERFORMANCE ANALYSIS; PROVABLY SECURE; PUBLIC KEYS; SECURITY; SECURITY ANALYSIS; SECURITY SCHEME; USER AUTHENTICATION; USER AUTHENTICATION SCHEME;

EID: 77955659710     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2009.12.008     Document Type: Article
Times cited : (98)

References (44)
  • 2
    • 0017930809 scopus 로고
    • A method for obtaining digital signature and public key cryptosystem
    • R.L. Rivest, A. Shamir, and L. Adelman A method for obtaining digital signature and public key cryptosystem Commun. ACM 21 2 1978 120 126
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adelman, L.3
  • 3
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • T. ELGamal A public-key cryptosystem and a signature scheme based on discrete logarithms IEEE Trans. Inform. Theory 31 1985 469 472
    • (1985) IEEE Trans. Inform. Theory , vol.31 , pp. 469-472
    • Elgamal, T.1
  • 4
    • 19744369256 scopus 로고    scopus 로고
    • DDH-based group key agreement in a mobile environment
    • J. Nam, J. Lee, S. Kim, and D. Won DDH-based group key agreement in a mobile environment J. Syst. Software 78 1 2005 73 83
    • (2005) J. Syst. Software , vol.78 , Issue.1 , pp. 73-83
    • Nam, J.1    Lee, J.2    Kim, S.3    Won, D.4
  • 5
    • 33751395122 scopus 로고    scopus 로고
    • GPRS/UMTS-aided authentication protocol for wireless LANs
    • Y.M. Tseng GPRS/UMTS-aided authentication protocol for wireless LANs IEE Proc.-Commun. 153 6 2006 810 817
    • (2006) IEE Proc.-Commun. , vol.153 , Issue.6 , pp. 810-817
    • Tseng, Y.M.1
  • 6
    • 34249876364 scopus 로고    scopus 로고
    • A resource-constrained group key agreement protocol for imbalance wireless networks
    • Y.M. Tseng A resource-constrained group key agreement protocol for imbalance wireless networks Comput. Security 26 4 2007 331 337
    • (2007) Comput. Security , vol.26 , Issue.4 , pp. 331-337
    • Tseng, Y.M.1
  • 7
    • 33845653685 scopus 로고    scopus 로고
    • A secure authenticated group key agreement protocol for resource-limited mobile devices
    • Y.M. Tseng A secure authenticated group key agreement protocol for resource-limited mobile devices Comput. J. 50 1 2007 41 52
    • (2007) Comput. J. , vol.50 , Issue.1 , pp. 41-52
    • Tseng, Y.M.1
  • 9
    • 84946838086 scopus 로고    scopus 로고
    • Efficient and mutually authenticated key exchange for low power computing devices
    • LNCS Springer-Verlag 2001
    • D.S. Wong, A.H. Chan, Efficient and mutually authenticated key exchange for low power computing devices, in: Proceedings of the Advances in Cryptology-Asiacrypt 2001, LNCS, vol. 2248, Springer-Verlag, 2001, pp. 172-289.
    • (2001) Proceedings of the Advances in Cryptology-Asiacrypt , vol.2248 , pp. 172-289
    • Wong, D.S.1    Chan, A.H.2
  • 10
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • LNCS Springer-Verlag
    • A. Shamir, Identity-based cryptosystems and signature schemes, in: Proceedings of the Advances in Cryptology-Crypto'84, LNCS, vol. 196, Springer-Verlag, 1984, pp. 47-53.
    • (1984) Proceedings of the Advances in Cryptology-Crypto'84 , vol.196 , pp. 47-53
    • Shamir, A.1
  • 11
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Preliminary version in: Proceedings of the Advances in Cryptology-CRYPTO 2001, LNCS, vol. 2139, Springer-Verlag, 2001, pp. 213-229
    • D. Boneh, M. Franklin, Identity-based encryption from the Weil pairing, SIAM J. Comput. (2003) 32(3) 586-615. Preliminary version in: Proceedings of the Advances in Cryptology-CRYPTO 2001, LNCS, vol. 2139, Springer-Verlag, 2001, pp. 213-229.
    • (2003) SIAM J. Comput. , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 12
    • 0037142442 scopus 로고    scopus 로고
    • An identity based authenticated key agreement protocol based on the Weil pairing
    • N.P. Smart An identity based authenticated key agreement protocol based on the Weil pairing Electron. Lett. 38 13 2002 630 632
    • (2002) Electron. Lett. , vol.38 , Issue.13 , pp. 630-632
    • Smart, N.P.1
  • 13
    • 0038680685 scopus 로고    scopus 로고
    • Efficient ID-based authenticated key agreement protocol based on the Weil pairing
    • K. Shim Efficient ID-based authenticated key agreement protocol based on the Weil pairing Electron. Lett. 39 8 2003 653 654
    • (2003) Electron. Lett. , vol.39 , Issue.8 , pp. 653-654
    • Shim, K.1
  • 15
    • 10444220191 scopus 로고    scopus 로고
    • Efficient identity-based authenticated key agreement protocol from pairings
    • Y.J. Choie, E. Jeong, and E. Lee Efficient identity-based authenticated key agreement protocol from pairings Appl. Math. Comput. 162 1 2005
    • (2005) Appl. Math. Comput. , vol.162 , Issue.1
    • Choie, Y.J.1    Jeong, E.2    Lee, E.3
  • 17
    • 34347393777 scopus 로고    scopus 로고
    • Identity-based key agreement protocols from pairings
    • L. Chen, Z. Cheng, and N.P. Smart Identity-based key agreement protocols from pairings Int. J. Inform. Security 6 4 2007 213 241
    • (2007) Int. J. Inform. Security , vol.6 , Issue.4 , pp. 213-241
    • Chen, L.1    Cheng, Z.2    Smart, N.P.3
  • 18
    • 73149090428 scopus 로고    scopus 로고
    • Efficient identity-based authenticated key agreement protocol with PKG forward secrecy
    • S. Wang, Z. Cao, and F. Cao Efficient identity-based authenticated key agreement protocol with PKG forward secrecy Int. J. Network Security 7 2 2008 181 186
    • (2008) Int. J. Network Security , vol.7 , Issue.2 , pp. 181-186
    • Wang, S.1    Cao, Z.2    Cao, F.3
  • 19
    • 0037194815 scopus 로고    scopus 로고
    • ID-based signatures from pairings on elliptic curves
    • K. Paterson ID-based signatures from pairings on elliptic curves Electron. Lett. 38 18 2002 1025 1026
    • (2002) Electron. Lett. , vol.38 , Issue.18 , pp. 1025-1026
    • Paterson, K.1
  • 20
    • 35248844436 scopus 로고    scopus 로고
    • An identity-based signature from gap Diffie-Hellman groups
    • LNCS Springer-Verlag
    • J.C. Cha, J.H. Cheon, An identity-based signature from gap Diffie-Hellman groups, in: Proceedings of the Public-Key Cryptography-PKC 2003, LNCS, vol. 2567, Springer-Verlag, 2003, pp. 18-30.
    • (2003) Proceedings of the Public-Key Cryptography-PKC 2003 , vol.2567 , pp. 18-30
    • Cha, J.C.1    Cheon, J.H.2
  • 24
    • 70349706045 scopus 로고    scopus 로고
    • Towards efficient ID-based signature schemes with batch verifications from bilinear pairings
    • IEEE
    • Y.M. Tseng, T.Y. Wu, J.D. Wu, Towards efficient ID-based signature schemes with batch verifications from bilinear pairings, in: Proceedings of the WAIS2009 in Conjunction with ARES2009, IEEE, 2009, pp. 935-940.
    • (2009) Proceedings of the WAIS2009 in Conjunction with ARES2009 , pp. 935-940
    • Tseng, Y.M.1    Wu, T.Y.2    Wu, J.D.3
  • 25
    • 33744776672 scopus 로고    scopus 로고
    • A novel remote user authentication scheme using bilinear pairings
    • M.L. Das, A. Saxena, V.P. Gulati, and D.B. Phatak A novel remote user authentication scheme using bilinear pairings Comput. Security 25 3 2006 184 189
    • (2006) Comput. Security , vol.25 , Issue.3 , pp. 184-189
    • Das, M.L.1    Saxena, A.2    Gulati, V.P.3    Phatak, D.B.4
  • 28
    • 47949104161 scopus 로고    scopus 로고
    • A pairing-based user authentication scheme for wireless clients with smart cards
    • Y.M. Tseng, T.Y. Wu, and J.D. Wu A pairing-based user authentication scheme for wireless clients with smart cards Informatica 19 2 2008 285 302
    • (2008) Informatica , vol.19 , Issue.2 , pp. 285-302
    • Tseng, Y.M.1    Wu, T.Y.2    Wu, J.D.3
  • 29
    • 54349089114 scopus 로고    scopus 로고
    • An improved bilinear pairing based remote user authentication scheme
    • T. Goriparthi, M.L. Das, and A. Saxena An improved bilinear pairing based remote user authentication scheme Comput. Standard Interf. 31 1 2009 181 185
    • (2009) Comput. Standard Interf. , vol.31 , Issue.1 , pp. 181-185
    • Goriparthi, T.1    Das, M.L.2    Saxena, A.3
  • 34
    • 33645585449 scopus 로고    scopus 로고
    • ID-based cryptosystems with pairing on elliptic curve
    • Report 2003/54
    • R. Sakai, M. Kasahara, ID-based cryptosystems with pairing on elliptic curve, Cryptology ePrint Archive, 2003, Report 2003/54.
    • (2003) Cryptology EPrint Archive
    • Sakai, R.1    Kasahara, M.2
  • 38
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • D. Pointcheval, and J. Stern Security arguments for digital signatures and blind signatures J. Cryptol. 13 2000 361 396
    • (2000) J. Cryptol. , vol.13 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2
  • 39
    • 24144479376 scopus 로고    scopus 로고
    • Computing the Tate pairing
    • LNCS Springer-Verlag
    • M. Scott, Computing the Tate pairing, in: Proceedings of the Cryptology-CT-RSA 2005, LNCS, vol. 3376, Springer-Verlag, 2005, pp. 293-304.
    • (2005) Proceedings of the Cryptology-CT-RSA 2005 , vol.3376 , pp. 293-304
    • Scott, M.1
  • 43
    • 77955657180 scopus 로고    scopus 로고
    • Philips HiPerSmart, 〈http://www.testech-elect.com/ashling/hps-tools. htm〉.
    • Philips HiPerSmart
  • 44
    • 82155199061 scopus 로고    scopus 로고
    • Shamus Software, 〈http://www.shamus.ie/index.php〉.
    • Shamus Software


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.