메뉴 건너뛰기




Volumn 19, Issue 3, 2011, Pages 335-347

Remote mutual authentication and key agreement scheme based on elliptic curve cryptosystem

Author keywords

Authentication; Cryptanalysis; Elliptic curve cryptosystem; Key agreement; Password; Smart card

Indexed keywords

CRYPTANALYSIS; DIFFIE-HELLMAN PROBLEM; ELLIPTIC CURVE; ELLIPTIC CURVE CRYPTOSYSTEM; IMPROVED SCHEME; KEY AGREEMENT; MUTUAL AUTHENTICATION; ONE WAY HASH FUNCTIONS; PASSWORD; PERFECT FORWARD SECRECY; REMOTE ACCESS; REMOTE USER AUTHENTICATION SCHEMES; SECURITY PROBLEMS;

EID: 79955378910     PISSN: 13000632     EISSN: 13036203     Source Type: Journal    
DOI: 10.3906/elk-1004-16     Document Type: Article
Times cited : (2)

References (26)
  • 1
    • 0025474612 scopus 로고
    • Smart cards provide very high security and flexibility in subscribers management
    • P. Peyret, G. Lisimaque, T.Y. Chua, "Smart cards provide very high security and flexibility in subscribers management," IEEE Transactions on Consumer Electronics, Vol. 36, No. 3, pp. 744-752, 1990.
    • (1990) IEEE Transactions on Consumer Electronics , vol.36 , Issue.3 , pp. 744-752
    • Peyret, P.1    Lisimaque, G.2    Chua, T.Y.3
  • 2
    • 0040545605 scopus 로고
    • The future is in the pc cards
    • D. Sternglass, "The future is in the pc cards," IEEE Spectrum, Vol. 29, No. 6, pp. 46-50, 1992.
    • (1992) IEEE Spectrum , vol.29 , Issue.6 , pp. 46-50
    • Sternglass, D.1
  • 3
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport, "Password authentication with insecure communication," Communications of the ACM, Vol. 24, pp. 770-772, 1981.
    • (1981) Communications of the ACM , vol.24 , pp. 770-772
    • Lamport, L.1
  • 4
    • 0034318245 scopus 로고    scopus 로고
    • An efficient remote user authentication scheme using smart cards
    • November
    • H.M. Sun, "An efficient remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, Vol. 46, No. 4, pp. 958-961, November 2000.
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.4 , pp. 958-961
    • Sun, H.M.1
  • 5
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication: Smart card
    • H.Y. Chien, J.K. Jan, Y.H. Tseng, "An efficient and practical solution to remote authentication: smart card," Computers and Security. Vol. 21, No. 4, pp. 372-375, 2002.
    • (2002) Computers and Security , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.Y.1    Jan, J.K.2    Tseng, Y.H.3
  • 6
    • 0742268499 scopus 로고    scopus 로고
    • Security of Chien et al's remote user authentication scheme using smart card
    • C.L. Hsu, "Security of Chien et al's remote user authentication scheme using smart card," Computer Standards and Interfaces, Vol. 26, pp. 167-169, 2004.
    • (2004) Computer Standards and Interfaces , vol.26 , pp. 167-169
    • Hsu, C.L.1
  • 7
    • 1542335451 scopus 로고    scopus 로고
    • Efficient password authenticated key agreement using smart cards
    • W.S. Juang, "Efficient password authenticated key agreement using smart cards," Computers and Security, Vol. 23, pp. 167-173, 2004.
    • (2004) Computers and Security , vol.23 , pp. 167-173
    • Juang, W.S.1
  • 8
    • 32444434862 scopus 로고    scopus 로고
    • Efficient remote mutual authentication and key agreement
    • W.G. Shieh, J.M. Wang, "Efficient remote mutual authentication and key agreement," Computers and Security, Vol. 25, pp. 72-77, 2006.
    • (2006) Computers and Security , vol.25 , pp. 72-77
    • Shieh, W.G.1    Wang, J.M.2
  • 9
    • 33646477537 scopus 로고    scopus 로고
    • An efficient and complete remote user authentication scheme using smart cards
    • H.T. Liaw, J.F. Lin, W.C. Wu, "An efficient and complete remote user authentication scheme using smart cards," Mathematical and Computer Modelling, vol. 44, pp. 223-228, 2006.
    • (2006) Mathematical and Computer Modelling , vol.44 , pp. 223-228
    • Liaw, H.T.1    Lin, J.F.2    Wu, W.C.3
  • 11
    • 34248666700 scopus 로고    scopus 로고
    • Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
    • DOI 10.1016/j.csi.2006.11.005, PII S0920548906001322
    • X.M. Wang, W.F. Zhang, J.S. Zhang, M.K. Khan, "Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards," Computer Standards & Interfaces, Vol. 29, No. 5, pp. 507-512, 2007. (Pubitemid 46771122)
    • (2007) Computer Standards and Interfaces , vol.29 , Issue.5 , pp. 507-512
    • Wang, X.-M.1    Zhang, W.-F.2    Zhang, J.-S.3    Khan, M.K.4
  • 12
    • 52949137008 scopus 로고    scopus 로고
    • Two-factor mutual authentication based on smart cards and passwords
    • G. Yang, D.S. Wong, H. Wang, X. Deng, "Two-factor mutual authentication based on smart cards and passwords," Journal of Computer and System Sciences, Vol. 74, No. 7, pp. 1160-1172, 2008.
    • (2008) Journal of Computer and System Sciences , vol.74 , Issue.7 , pp. 1160-1172
    • Yang, G.1    Wong, D.S.2    Wang, H.3    Deng, X.4
  • 13
    • 64249125305 scopus 로고    scopus 로고
    • An improved smart card based password authentication scheme with provable security
    • J. Xu, W.T. Zhu, D.G. Feng, "An improved smart card based password authentication scheme with provable security," Computer Standards & Interfaces, Vol. 31, pp. 723-728, 2009.
    • (2009) Computer Standards & Interfaces , vol.31 , pp. 723-728
    • Xu, J.1    Zhu, W.T.2    Feng, D.G.3
  • 15
    • 29144444418 scopus 로고    scopus 로고
    • Vulnerabilities of Wu-Chieu's improved password authentication scheme using smart cards
    • November
    • W.C. Ku, H.M. Chuang, M.J. Tsaur, "Vulnerabilities of Wu-Chieu's improved password authentication scheme using smart cards," IEICE Trans. Fundamentals, Vol. E88-A, No. 11, pp. 3241-3243, November 2005.
    • (2005) IEICE Trans. Fundamentals , vol.E88-A , Issue.11 , pp. 3241-3243
    • Ku, W.C.1    Chuang, H.M.2    Tsaur, M.J.3
  • 17
    • 85015402934 scopus 로고
    • Uses of elliptic curves in cryptography
    • Santa Barbara, USA
    • V. Miller, "Uses of elliptic curves in cryptography," Proceedings of Crypto'85, Santa Barbara, USA, pp. 417-426, 1986.
    • (1986) Proceedings of Crypto'85 , pp. 417-426
    • Miller, V.1
  • 18
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • N. Koblitz, "Elliptic Curve Cryptosystems," Mathematics of Computation, Vol. 48, pp. 203-209, 1987.
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 19
    • 0002956095 scopus 로고
    • CM-curves with good cryptographic properties
    • Santa Barbara, USA
    • N. Koblitz, "CM-curves with good cryptographic properties," Proceedings of Crypto'91, Santa Barbara, USA, 1992.
    • (1992) Proceedings of Crypto'91
    • Koblitz, N.1
  • 20
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R.M. Needham, M.D. Schroeder, "Using encryption for authentication in large networks of computers," Communications of the ACM, Vol. 21, No. 12, pp. 993-999, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 21
    • 79955422068 scopus 로고    scopus 로고
    • Certicom Research Standard for efficient cryptography, SEC 1: EC Cryptography, Ver.1.0, 2000
    • Certicom Research, Standard for efficient cryptography, SEC 1: EC Cryptography, Ver. 1.0, 2000.
  • 26
    • 84968502759 scopus 로고
    • A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
    • G. Frey, H. Ruck, "A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves," Mathematics of Computation, Vol. 62, pp. 865-874, 1994.
    • (1994) Mathematics of Computation , vol.62 , pp. 865-874
    • Frey, G.1    Ruck, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.