메뉴 건너뛰기




Volumn 2013, Issue , 2013, Pages

Authenticated blind issuing of symmetric keys for mobile access control system without trusted parties

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATED KEY AGREEMENT; BATTERY CAPACITY; COMPUTATION ABILITY; MOBILE ACCESS CONTROLS; MOBILE AUTHENTICATION; PUBLIC KEY CRYPTOSYSTEMS; SECRET-KEY AGREEMENTS; SECURITY CONSIDERATIONS;

EID: 84880153208     PISSN: 1024123X     EISSN: 15635147     Source Type: Journal    
DOI: 10.1155/2013/858579     Document Type: Article
Times cited : (3)

References (53)
  • 1
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • DOI 10.1145/358790.358797
    • Lamport L., Password authentication with insecure communication. Communications of the ACM 1981 24 11 770 772 2-s2.0-0019634370 10.1145/358790.358797 (Pubitemid 12462508)
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport Leslie1
  • 2
    • 1542647564 scopus 로고    scopus 로고
    • A remote user authentication scheme using smart cards with forward secrecy
    • 2-s2.0-1542647564 10.1109/TCE.2003.1261225
    • Awasthi A. K., Lal S., A remote user authentication scheme using smart cards with forward secrecy. IEEE Transactions on Consumer Electronics 2003 49 4 1246 1248 2-s2.0-1542647564 10.1109/TCE.2003.1261225
    • (2003) IEEE Transactions on Consumer Electronics , vol.49 , Issue.4 , pp. 1246-1248
    • Awasthi, A.K.1    Lal, S.2
  • 3
    • 4043089982 scopus 로고    scopus 로고
    • An enhanced remote user authentication scheme using smart cards
    • 2-s2.0-4043089982 10.1109/TCE.2004.1309430
    • Awasthi A. K., Lal S., An enhanced remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 2004 50 2 583 586 2-s2.0-4043089982 10.1109/TCE.2004.1309430
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.2 , pp. 583-586
    • Awasthi, A.K.1    Lal, S.2
  • 4
    • 0000112683 scopus 로고
    • Elliptic curve cryptosystems
    • 10.2307/2007884 MR866109 ZBL0622.94015
    • Koblitz N., Elliptic curve cryptosystems. Mathematics of Computation 1987 48 177 203 209 10.2307/2007884 MR866109 ZBL0622.94015
    • (1987) Mathematics of Computation , vol.48 , Issue.177 , pp. 203-209
    • Koblitz, N.1
  • 5
    • 12544254099 scopus 로고    scopus 로고
    • Security analysis and improvement of the efficient password-based authentication protocol
    • DOI 10.1109/LCOMM.2005.01032
    • Kwon T., Park Y. H., Lee H. J., Security analysis and improvement of the efficient password-based authentication protocol. IEEE Communications Letters 2005 9 1 93 95 2-s2.0-12544254099 10.1109/LCOMM.2005.01032 (Pubitemid 40152132)
    • (2005) IEEE Communications Letters , vol.9 , Issue.1 , pp. 93-95
    • Kwon, T.1    Park, Y.H.2    Lee, H.J.3
  • 6
    • 0017930809 scopus 로고
    • Method for obtaining digital signatures and public-key cryptosystems
    • DOI 10.1145/359340.359342
    • Rivest R. L., Shamir A., Adleman L., A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978 21 2 120 126 10.1145/359340.359342 MR700103 ZBL0368.94005 (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 7
    • 84872151913 scopus 로고    scopus 로고
    • Password authentication based on fractal coding scheme
    • 340861 10.1155/2012/340861
    • Al-Saidi N. M., Said M. R. M., Othman W. A. M., Password authentication based on fractal coding scheme. Journal of Applied Mathematics 2012 2012 16 340861 10.1155/2012/340861
    • (2012) Journal of Applied Mathematics , vol.2012 , pp. 16
    • Al-Saidi, N.M.1    Said, M.R.M.2    Othman, W.A.M.3
  • 8
    • 84863637154 scopus 로고    scopus 로고
    • A security-performance-balanced user authentication scheme for wireless sensor networks
    • 382810 10.1155/2012/382810
    • Yoo S. G., Park K. Y., Kim J., A security-performance-balanced user authentication scheme for wireless sensor networks. International Journal of Distributed Sensor Networks 2012 2012 11 382810 10.1155/2012/382810
    • (2012) International Journal of Distributed Sensor Networks , vol.2012 , pp. 11
    • Yoo, S.G.1    Park, K.Y.2    Kim, J.3
  • 10
    • 84877260877 scopus 로고    scopus 로고
    • An efficient key-policy attribute-based encryption scheme with constant ciphertext length
    • 10.1155/2013/810969 810969
    • Wang C., Luo J., An efficient key-policy attribute-based encryption scheme with constant ciphertext length. Mathematical Problems in Engineering 2013 2013 7 10.1155/2013/810969 810969
    • (2013) Mathematical Problems in Engineering , vol.2013 , pp. 7
    • Wang, C.1    Luo, J.2
  • 11
    • 84944291851 scopus 로고
    • Overview of the GSM system and protocol architecture
    • Rahnema M., Overview of the GSM system and protocol architecture. IEEE Communications Magazine 1993 31 4 92 100
    • (1993) IEEE Communications Magazine , vol.31 , Issue.4 , pp. 92-100
    • Rahnema, M.1
  • 14
    • 74549221711 scopus 로고    scopus 로고
    • An efficient protocol for authenticated key agreement
    • MR1962800 ZBL1016.94025 2-s2.0-0037343565 10.1023/A:1022595222606
    • Law L., Menezes A., Qu M., Solinas J., Vanstone S., An efficient protocol for authenticated key agreement. Designs, Codes, and Cryptography 2003 28 2 119 134 MR1962800 ZBL1016.94025 2-s2.0-0037343565 10.1023/A:1022595222606
    • (2003) Designs, Codes, and Cryptography , vol.28 , Issue.2 , pp. 119-134
    • Law, L.1    Menezes, A.2    Qu, M.3    Solinas, J.4    Vanstone, S.5
  • 15
    • 84876518744 scopus 로고    scopus 로고
    • Unsupervised user similarity mining in gsm sensor networks
    • 10.1155/2013/589610 589610
    • Chen E., Unsupervised user similarity mining in gsm sensor networks. The Scientific World Journal 2013 2013 11 10.1155/2013/589610 589610
    • (2013) The Scientific World Journal , vol.2013 , pp. 11
    • Chen, E.1
  • 16
    • 84871369625 scopus 로고    scopus 로고
    • Fluorescence, decay time, and structural change of laser dye cresyl violet in solution due to microwave irradiation at gsm 900/1800 mobile phone frequencies
    • 10.1155/2012/965426 965426
    • Bayrakceken F., Yegin K., Fluorescence, decay time, and structural change of laser dye cresyl violet in solution due to microwave irradiation at gsm 900/1800 mobile phone frequencies. International Journal of Photoenergy 2012 2012 4 10.1155/2012/965426 965426
    • (2012) International Journal of Photoenergy , vol.2012 , pp. 4
    • Bayrakceken, F.1    Yegin, K.2
  • 17
    • 24144458508 scopus 로고    scopus 로고
    • A new two-party identity-based authenticated key agreement
    • Topics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
    • McCullagh N., Barreto P. S. L. M., A new two-party identity-based authenticated key agreement. Topics in Cryptology-CT-RSA 2005 2005 3376 Berlin, Germany Springer 262 274 10.1007/978-3-540-30574-3-18 MR2174382 ZBL1079.94563 (Pubitemid 41231216)
    • (2005) Lecture Notes in Computer Science , vol.3376 , pp. 262-274
    • McCullagh, N.1    Barreto, P.S.L.M.2
  • 20
    • 0033332268 scopus 로고    scopus 로고
    • Secure communication mechanisms for GSM networks
    • DOI 10.1109/30.809184
    • Lo C.-C., Chen Y.-J., Secure communication mechanisms for GSM networks. IEEE Transactions on Consumer Electronics 1999 45 4 1074 1080 2-s2.0-0033332268 10.1109/30.809184 (Pubitemid 30561606)
    • (1999) IEEE Transactions on Consumer Electronics , vol.45 , Issue.4 , pp. 1074-1080
    • Lo, C.-C.1    Chen, Y.-J.2
  • 22
    • 80052674106 scopus 로고    scopus 로고
    • BVS: A lightweight forward and backward secure scheme for PMU communications in smart grid
    • 2-s2.0-80052674106 10.1155/2011/382147 382147
    • Ren W., Song J., Lei M., Ren Y., BVS: a lightweight forward and backward secure scheme for PMU communications in smart grid. International Journal of Digital Multimedia Broadcasting 2011 2011 9 2-s2.0-80052674106 10.1155/2011/382147 382147
    • (2011) International Journal of Digital Multimedia Broadcasting , vol.2011 , pp. 9
    • Ren, W.1    Song, J.2    Lei, M.3    Ren, Y.4
  • 23
    • 84856812293 scopus 로고    scopus 로고
    • Revisiting sum of residues modular multiplication
    • 2-s2.0-84856812293 10.1155/2010/657076 657076 MR2738316 ZBL1229.94046
    • Kong Y., Phillips B., Revisiting sum of residues modular multiplication. Journal of Electrical and Computer Engineering 2010 2010 9 2-s2.0-84856812293 10.1155/2010/657076 657076 MR2738316 ZBL1229.94046
    • (2010) Journal of Electrical and Computer Engineering , vol.2010 , pp. 9
    • Kong, Y.1    Phillips, B.2
  • 24
    • 84863699190 scopus 로고    scopus 로고
    • Authentication and integrity in the smart grid: An empirical study in substation automation systems
    • 10.1155/2012/175262 175262
    • Lu X., Wang W., Ma J., Authentication and integrity in the smart grid: an empirical study in substation automation systems. International Journal of Distributed Sensor Networks 2012 2012 13 10.1155/2012/175262 175262
    • (2012) International Journal of Distributed Sensor Networks , vol.2012 , pp. 13
    • Lu, X.1    Wang, W.2    Ma, J.3
  • 25
    • 84880141803 scopus 로고    scopus 로고
    • Certicom Research: Standard for efficient cryptography - SEC 1: Elliptic curve cryptography, 2000
    • Certicom Research: Standard for efficient cryptography-SEC 1: Elliptic curve cryptography, 2000, http://www.secg.org/
  • 27
    • 84877308219 scopus 로고    scopus 로고
    • A new user authentication protocol for wireless sensor networks using elliptic curves cryptography
    • 730831 10.1155/2013/730831
    • Shi W., Gong P., A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. International Journal of Distributed Sensor Networks 2013 2013 7 730831 10.1155/2013/730831
    • (2013) International Journal of Distributed Sensor Networks , vol.2013 , pp. 7
    • Shi, W.1    Gong, P.2
  • 29
    • 84880141347 scopus 로고    scopus 로고
    • NIST Special Publication 800-56: recommendation on key establishment schemes, Draft 2.0, 2003
    • National Institute of Standards and Technology,. NIST Special Publication 800-56: recommendation on key establishment schemes, Draft 2.0, 2003, http://csrc.nist.gov/groups/ST/toolkit/index.html
  • 31
    • 78049296439 scopus 로고    scopus 로고
    • A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
    • MR2653321 ZBL1193.94069 2-s2.0-78049296439 10.1016/j.ins.2010.04.002
    • Cao X., Kou W., Du X., A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Information Sciences 2010 180 15 2895 2903 MR2653321 ZBL1193.94069 2-s2.0-78049296439 10.1016/j.ins.2010.04. 002
    • (2010) Information Sciences , vol.180 , Issue.15 , pp. 2895-2903
    • Cao, X.1    Kou, W.2    Du, X.3
  • 33
    • 0022811943 scopus 로고
    • Proposal for identity-based key distribution systems
    • Okamoto E., Proposal for identity-based key distribution systems. Electronics Letters 1986 22 24 1283 1284 2-s2.0-0022811943 (Pubitemid 17525449)
    • (1986) Electronics Letters , vol.22 , Issue.24 , pp. 1283-1284
    • Okamoto, E.1
  • 34
    • 0038680685 scopus 로고    scopus 로고
    • Efficient ID-based authenticated key agreement protocol based on Weil pairing
    • 2-s2.0-0038680685 10.1049/el:20030448
    • Shim K., Efficient ID-based authenticated key agreement protocol based on Weil pairing. Electronics Letters 2003 39 8 653 654 2-s2.0-0038680685 10.1049/el:20030448
    • (2003) Electronics Letters , vol.39 , Issue.8 , pp. 653-654
    • Shim, K.1
  • 35
    • 0037142442 scopus 로고    scopus 로고
    • Identity-based authenticated key agreement protocol based on Weil pairing
    • DOI 10.1049/el:20020387
    • Smart N. P., Identity-based authenticated key agreement protocol based on Weil pairing. Electronics Letters 2002 38 13 630 632 2-s2.0-0037142442 10.1049/el:20020387 (Pubitemid 34725603)
    • (2002) Electronics Letters , vol.38 , Issue.13 , pp. 630-632
    • Smart, N.P.1
  • 36
    • 34347390578 scopus 로고
    • Key distribution system for mail systems using ID-related information directory
    • 2-s2.0-34347390578
    • Tanaka K., Okamoto E., Key distribution system for mail systems using ID-related information directory. Computers and Security 1991 10 1 25 33 2-s2.0-34347390578
    • (1991) Computers and Security , vol.10 , Issue.1 , pp. 25-33
    • Tanaka, K.1    Okamoto, E.2
  • 38
    • 33748173666 scopus 로고    scopus 로고
    • Revisit of mccullagh-barreto two-party id-based authenticated key agreement protocols
    • Choo K., Revisit of mccullagh-barreto two-party id-based authenticated key agreement protocols. International Journal of Network Security 2005 1 3 154 160
    • (2005) International Journal of Network Security , vol.1 , Issue.3 , pp. 154-160
    • Choo, K.1
  • 39
    • 77952742569 scopus 로고    scopus 로고
    • An improved key agreement protocol based on chaos
    • MR2652676 ZBL1222.94039 2-s2.0-77952742569 10.1016/j.cnsns.2010.02.014
    • Wang X., Zhao J., An improved key agreement protocol based on chaos. Communications in Nonlinear Science and Numerical Simulation 2010 15 12 4052 4057 MR2652676 ZBL1222.94039 2-s2.0-77952742569 10.1016/j.cnsns.2010.02.014
    • (2010) Communications in Nonlinear Science and Numerical Simulation , vol.15 , Issue.12 , pp. 4052-4057
    • Wang, X.1    Zhao, J.2
  • 40
    • 33751227507 scopus 로고    scopus 로고
    • A novel key agreement protocol based on chaotic maps
    • DOI 10.1016/j.ins.2006.07.026, PII S0020025506002246
    • Xiao D., Liao X., Deng S., A novel key agreement protocol based on chaotic maps. Information Sciences 2007 177 4 1136 1142 MR2288747 2-s2.0-33751227507 10.1016/j.ins.2006.07.026 (Pubitemid 44791324)
    • (2007) Information Sciences , vol.177 , Issue.4 , pp. 1136-1142
    • Xiao, D.1    Liao, X.2    Deng, S.3
  • 41
    • 43049150816 scopus 로고    scopus 로고
    • Security of a key agreement protocol based on chaotic maps
    • DOI 10.1016/j.chaos.2007.01.017, PII S0960077907000343
    • Han S., Security of a key agreement protocol based on chaotic maps. Chaos, Solitons and Fractals 2008 38 3 764 768 MR2423362 ZBL1146.94304 2-s2.0-43049150816 10.1016/j.chaos.2007.01.017 (Pubitemid 351633025)
    • (2008) Chaos, Solitons and Fractals , vol.38 , Issue.3 , pp. 764-768
    • Han, S.1
  • 43
    • 62949175202 scopus 로고    scopus 로고
    • Chaotic map based key agreement with/out clock synchronization
    • MR2512932 ZBL1197.94190 2-s2.0-62949175202 10.1016/j.chaos.2007.06.030
    • Han S., Chang E., Chaotic map based key agreement with/out clock synchronization. Chaos, Solitons and Fractals 2009 39 3 1283 1289 MR2512932 ZBL1197.94190 2-s2.0-62949175202 10.1016/j.chaos.2007.06.030
    • (2009) Chaos, Solitons and Fractals , vol.39 , Issue.3 , pp. 1283-1289
    • Han, S.1    Chang, E.2
  • 44
    • 78650310667 scopus 로고    scopus 로고
    • Cryptanalysis on a parallel keyed hash function based on chaotic neural network
    • 2-s2.0-78650310667 10.1016/j.neucom.2010.05.011
    • Wang X.-Y., Zhao J.-F., Cryptanalysis on a parallel keyed hash function based on chaotic neural network. Neurocomputing 2010 73 16-18 3224 3228 2-s2.0-78650310667 10.1016/j.neucom.2010.05.011
    • (2010) Neurocomputing , vol.73 , Issue.16-18 , pp. 3224-3228
    • Wang, X.-Y.1    Zhao, J.-F.2
  • 46
    • 78049382801 scopus 로고    scopus 로고
    • An anonymous key agreement protocol based on chaotic maps
    • MR2736063 ZBL1221.94057 2-s2.0-78049382801 10.1016/j.cnsns.2010.08.015
    • Niu Y., Wang X., An anonymous key agreement protocol based on chaotic maps. Communications in Nonlinear Science and Numerical Simulation 2011 16 4 1986 1992 MR2736063 ZBL1221.94057 2-s2.0-78049382801 10.1016/j.cnsns.2010.08.015
    • (2011) Communications in Nonlinear Science and Numerical Simulation , vol.16 , Issue.4 , pp. 1986-1992
    • Niu, Y.1    Wang, X.2
  • 48
    • 84867684250 scopus 로고    scopus 로고
    • White-light interferometric method for secure key distribution
    • 2-s2.0-77958067572 10.1007/s11227-010-0488-x
    • Haist T., Osten W., White-light interferometric method for secure key distribution. The Journal of Supercomputing 2012 62 2 656 662 2-s2.0-77958067572 10.1007/s11227-010-0488-x
    • (2012) The Journal of Supercomputing , vol.62 , Issue.2 , pp. 656-662
    • Haist, T.1    Osten, W.2
  • 50
    • 84880150887 scopus 로고    scopus 로고
    • Wi-Fi Direct, 2012
    • Wikipedia,. Wi-Fi Direct, 2012, http://en.wikipedia.org/wiki/Wi-Fi- Direct/
    • Wikipedia1
  • 51
    • 84880173013 scopus 로고    scopus 로고
    • Bluetooth specification, 2012
    • Bluetooth S.,. Bluetooth specification, 2012, http://www.Bluetooth.com/
    • Bluetooth, S.1
  • 52
    • 0035668782 scopus 로고    scopus 로고
    • An overview of the Bluetooth wireless technology
    • DOI 10.1109/35.968817
    • Bisdikian C., An overview of the Bluetooth wireless technology. IEEE Communications Magazine 2001 39 12 86 94 2-s2.0-0035668782 10.1109/35.968817 (Pubitemid 34022248)
    • (2001) IEEE Communications Magazine , vol.39 , Issue.12 , pp. 86-94
    • Bisdikian, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.