메뉴 건너뛰기




Volumn 73, Issue 3, 2013, Pages 1037-1047

Secure handover authentication protocol based on bilinear pairings

Author keywords

Bilinear pairings; Handover authentication; User unlinkability; Wireless networks

Indexed keywords

BILINEAR PAIRING; HANDOVER AUTHENTICATIONS; MUTUAL AUTHENTICATION; RANDOM ORACLE; SECURITY THREATS; SIGNATURE VERIFICATION; UNLINKABILITY; USER ANONYMITY;

EID: 84890563211     PISSN: 09296212     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11277-013-1246-1     Document Type: Article
Times cited : (30)

References (25)
  • 1
    • 59649101587 scopus 로고    scopus 로고
    • Enhanced authentication scheme with anonymity for roaming service in global mobility networks
    • 10.1016/j.comcom.2008.11.032
    • Chang, C. C.; Lee, C. Y.; Chiu, Y. C. (2009). Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communication, 32(4), 611-618.
    • (2009) Computer Communication , vol.32 , Issue.4 , pp. 611-618
    • Chang, C.C.1    Lee, C.Y.2    Chiu, Y.C.3
  • 2
    • 84879414438 scopus 로고    scopus 로고
    • Novel untraceable authenticated key agreement protocol suitable for mobile communication
    • Online First T M. doi: 10.1007/s11277-012-0822-0
    • Chang, C. C.; Le, H. D.; Chang, C. H. (2012). Novel untraceable authenticated key agreement protocol suitable for mobile communication. Wireless Personal Communications, Online First T M. doi: 10.1007/s11277-012-0822-0
    • (2012) Wireless Personal Communications
    • Chang, C.C.1    Le, H.D.2    Chang, C.H.3
  • 3
    • 70350435386 scopus 로고    scopus 로고
    • A fast and efficient handover authentication achieving conditional privacy in V2I networks
    • Choi, J.; Jung, S.; Kim, Y.; Yoo, M. (2009). A fast and efficient handover authentication achieving conditional privacy in V2I networks. In NEW2AN 2009, pp. 291-300.
    • (2009) NEW2AN 2009 , pp. 291-300
    • Choi, J.1    Jung, S.2    Kim, Y.3    Yoo, M.4
  • 4
    • 67651062654 scopus 로고    scopus 로고
    • A secure and efficient handover authentication based on light-weight Diffie-Hellman on mobile node in FMIPv6
    • Choi, J.; Jung, S. (2008) A secure and efficient handover authentication based on light-weight Diffie-Hellman on mobile node in FMIPv6. IEICE Transactions on Communications, E-91B(2), 605-608.
    • (2008) IEICE Transactions on Communications , vol.E-91B , Issue.2 , pp. 605-608
    • Choi, J.1    Jung, S.2
  • 5
    • 84856471625 scopus 로고    scopus 로고
    • Secure and efficient handover authentication based on bilinear pairing functions
    • 10.1109/TWC.2011.110811.111240
    • He, D.; Chen, C.; Chan, S.; Bu, J. (2012). Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communication, 11(1), 48-53.
    • (2012) IEEE Transactions on Wireless Communication , vol.11 , Issue.1 , pp. 48-53
    • He, D.1    Chen, C.2    Chan, S.3    Bu, J.4
  • 6
    • 84865443877 scopus 로고    scopus 로고
    • Analysis and improvement of a secure and efficient handover authentication for wireless networks
    • 10.1109/LCOMM.2012.061912.120941
    • He, D.; Chen, C.; Chan, S.; Bu, J. (2012). Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Communications Letters, 16(8), 1270-1273.
    • (2012) IEEE Communications Letters , vol.16 , Issue.8 , pp. 1270-1273
    • He, D.1    Chen, C.2    Chan, S.3    Bu, J.4
  • 7
    • 38549176356 scopus 로고    scopus 로고
    • SFRIC: A secure fast roaming scheme in wireless LAN using ID-based cryptography
    • Kim, Y.; Ren, W.; Jo, J.; Yang, M.; Jiang, Y.; Zheng, J. (2007). SFRIC: a secure fast roaming scheme in wireless LAN using ID-based cryptography. In Proceedings of ICC.
    • (2007) Proceedings of ICC
    • Kim, Y.1    Ren, W.2    Jo, J.3    Yang, M.4    Jiang, Y.5    Zheng, J.6
  • 8
    • 68849128250 scopus 로고    scopus 로고
    • Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
    • 10.1016/j.csi.2008.11.002
    • Hsiang, H. C.; Shih, W. K. (2009). Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces, 31(6), 1118-1123.
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.6 , pp. 1118-1123
    • Hsiang, H.C.1    Shih, W.K.2
  • 9
    • 54449094667 scopus 로고    scopus 로고
    • A secure dynamic ID based remote user authentication scheme for multi-server environment
    • 10.1016/j.csi.2007.10.007
    • Liao, Y. P.; Wang, S.-S. (2009). A secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces, 31(1), 24-29.
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.1 , pp. 24-29
    • Liao, Y.P.1    Wang, S.-S.2
  • 10
    • 49849096355 scopus 로고    scopus 로고
    • Efficient multi-server authentication scheme based on one-way hash function without verification table
    • 10.1016/j.cose.2008.04.001
    • Tsai, J. L. (2008). Efficient multi-server authentication scheme based on one-way hash function without verification table. Computers & Security, 27(3-4), 115-121.
    • (2008) Computers & Security , vol.27 , Issue.3-4 , pp. 115-121
    • Tsai, J.L.1
  • 11
  • 12
    • 77956240963 scopus 로고    scopus 로고
    • A novel remote user authentication scheme for multi-server environment without using smart cards
    • Yeh, K. H.; Lo, N. W. (2010). A novel remote user authentication scheme for multi-server environment without using smart cards. International Journal of Innovative Computing, Information & Control, 6(8), 3467-3478.
    • (2010) International Journal of Innovative Computing, Information & Control , vol.6 , Issue.8 , pp. 3467-3478
    • Yeh, K.H.1    Lo, N.W.2
  • 13
    • 33845726678 scopus 로고    scopus 로고
    • Securing vehicular ad hoc networks
    • Raya, M.; Hubaux, J. P. (2007). Securing vehicular ad hoc networks. Journal of Computer Security, 15(1), 39-68.
    • (2007) Journal of Computer Security , vol.15 , Issue.1 , pp. 39-68
    • Raya, M.1    Hubaux, J.P.2
  • 14
    • 84855354854 scopus 로고    scopus 로고
    • A novel authenticated group key agreement protocol for mobile environment
    • 10.1007/s12243-011-0241-3
    • Tsai, J. L. (2011). A novel authenticated group key agreement protocol for mobile environment. Annals of Telecommunications, 66(11-12), 663-669.
    • (2011) Annals of Telecommunications , vol.66 , Issue.11-12 , pp. 663-669
    • Tsai, J.L.1
  • 16
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-DNF formulas on ciphertexts
    • of LNCS. Springer
    • Boneh, D.; Goh, E.; Nissim, K. (2005). Evaluating 2-DNF formulas on ciphertexts. In Proceedings of 2005 TCC, vol. 3378 of LNCS. Springer, pp. 325-341.
    • (2005) Proceedings of 2005 TCC , vol.3378 , pp. 325-341
    • Boneh, D.1    Goh, E.2    Nissim, K.3
  • 17
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
    • 484737 10.1109/TIT.1978.1055817
    • Pohlig, S.; Hellman, M. (1978). An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Transactions on Information Theory, 24, 106-110.
    • (1978) IEEE Transactions on Information Theory , vol.24 , pp. 106-110
    • Pohlig, S.1    Hellman, M.2
  • 18
    • 79956293525 scopus 로고    scopus 로고
    • Converting pairing-based cryptosystems from composite-order groups to prime-order groups
    • 2660482
    • Freeman, D. M. (2010). Converting pairing-based cryptosystems from composite-order groups to prime-order groups. EUROCRYPT, 2010, 44-61.
    • (2010) EUROCRYPT , vol.2010 , pp. 44-61
    • Freeman, D.M.1
  • 20
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key agreement secure against dictionary attacks
    • 10.1007/3-540-45539-6-11
    • Bellare, M.; Pointcheval, D.; Rogaway, P. (2000). Authenticated key agreement secure against dictionary attacks. EUROCRYPT 2000. LNCS, 1807, 139-155.
    • (2000) EUROCRYPT 2000. LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 21
  • 22
    • 2642534140 scopus 로고    scopus 로고
    • Efficient and mutually authenticated key exchange for low power computing devices
    • Wong, D. S.; Chan, A. H. (2001). Efficient and mutually authenticated key exchange for low power computing devices. In Proceedings of ASIACRYPT'01, pp. 172-289.
    • (2001) Proceedings of ASIACRYPT'01 , pp. 172-289
    • Wong, D.S.1    Chan, A.H.2
  • 23
    • 26444474509 scopus 로고    scopus 로고
    • ID-based authenticated key agreement for low-power mobile devices
    • Brisbane
    • Choi, K. Y. et al. (2005). ID-based authenticated key agreement for low-power mobile devices. In Proceedings of ACISP'05, Brisbane, pp. 494-505.
    • (2005) Proceedings of ACISP'05 , pp. 494-505
    • Choi, K.Y.1
  • 24
    • 35048854587 scopus 로고    scopus 로고
    • An efficient signature scheme from bilinear pairings and its applications
    • LNCS
    • Zhang, F.; Safai, R.; Susilo, W. (2004). An efficient signature scheme from bilinear pairings and its applications. Advance in Public Key Cryptography-PKC 2004. LNCS, 2947, 227-290.
    • (2004) Advance in Public Key Cryptography-PKC 2004 , vol.2947 , pp. 227-290
    • Zhang, F.1    Safai, R.2    Susilo, W.3
  • 25
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • Pointcheval, D.; Stern, J. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptography, 13, 361-396.
    • (2000) Journal of Cryptography , vol.13 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.