메뉴 건너뛰기




Volumn 57, Issue 11-12, 2013, Pages 2703-2717

Design of improved password authentication and update scheme based on elliptic curve cryptography

Author keywords

Cryptographic hash function; Elliptic curve cryptography; Impersonation attack; Insider attack; Password authentication

Indexed keywords

CRYPTOGRAPHIC HASH FUNCTIONS; ELLIPTIC CURVE CRYPTOGRAPHY; IMPERSONATION ATTACK; INSIDER ATTACK; PASSWORD AUTHENTICATION;

EID: 84892506781     PISSN: 08957177     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.mcm.2011.07.001     Document Type: Article
Times cited : (82)

References (45)
  • 1
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport L. Password authentication with insecure communication. Communications of the ACM 1981, 24(11):770-772.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 2
    • 0033704170 scopus 로고    scopus 로고
    • Methods for protecting password transmission
    • Peyravian M., Zunic N. Methods for protecting password transmission. Computers and Security 2000, 19(5):466-469.
    • (2000) Computers and Security , vol.19 , Issue.5 , pp. 466-469
    • Peyravian, M.1    Zunic, N.2
  • 3
    • 0041698517 scopus 로고    scopus 로고
    • A remote user authentication scheme using hash functions
    • Lee C.C., Li L.H., Hwang M.S. A remote user authentication scheme using hash functions. ACM Operating Systems Review 2002, 36(4):23-29.
    • (2002) ACM Operating Systems Review , vol.36 , Issue.4 , pp. 23-29
    • Lee, C.C.1    Li, L.H.2    Hwang, M.S.3
  • 4
    • 7644232640 scopus 로고    scopus 로고
    • Weaknesses of Lee-Li-Hwang's Hash-based password authentication scheme
    • Ku W.C., Chen C.M., Lee H.L. Weaknesses of Lee-Li-Hwang's Hash-based password authentication scheme. ACM Operating Systems Review 2003, 37(4):19-25.
    • (2003) ACM Operating Systems Review , vol.37 , Issue.4 , pp. 19-25
    • Ku, W.C.1    Chen, C.M.2    Lee, H.L.3
  • 5
    • 33645790506 scopus 로고    scopus 로고
    • A secure user authentication scheme using hash functions
    • Yoon E.J., Ruy E.K., Roo K.Y. A secure user authentication scheme using hash functions. ACM Operating Systems Review 2004, 38(2):62-68.
    • (2004) ACM Operating Systems Review , vol.38 , Issue.2 , pp. 62-68
    • Yoon, E.J.1    Ruy, E.K.2    Roo, K.Y.3
  • 6
    • 33646469746 scopus 로고    scopus 로고
    • Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme
    • Ku W.C., Chaing M.H., Chang S.T. Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme. ACM Operating Systems Review 2005, 39(1):85-89.
    • (2005) ACM Operating Systems Review , vol.39 , Issue.1 , pp. 85-89
    • Ku, W.C.1    Chaing, M.H.2    Chang, S.T.3
  • 7
    • 0036556279 scopus 로고    scopus 로고
    • Improvement on Peyravian-Zunic's password authentication schemes
    • E85-B
    • Hwang J.J., Yeh T.C. Improvement on Peyravian-Zunic's password authentication schemes. IEICE Transactions on Communications 2002, E85-B(4):823-825.
    • (2002) IEICE Transactions on Communications , Issue.4 , pp. 823-825
    • Hwang, J.J.1    Yeh, T.C.2
  • 8
    • 0142007776 scopus 로고    scopus 로고
    • Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme
    • E86-B
    • Ku W.C., Chen C.M., Hui L. Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme. IEICE Transactions on Communications 2002, E86-B(5):1682-1684.
    • (2002) IEICE Transactions on Communications , Issue.5 , pp. 1682-1684
    • Ku, W.C.1    Chen, C.M.2    Hui, L.3
  • 9
    • 0037282439 scopus 로고    scopus 로고
    • A password authentication scheme with secure password updating
    • Lin C.L., Hwang T. A password authentication scheme with secure password updating. Computers and Security 2003, 22(1):68-72.
    • (2003) Computers and Security , vol.22 , Issue.1 , pp. 68-72
    • Lin, C.L.1    Hwang, T.2
  • 10
    • 33144456748 scopus 로고    scopus 로고
    • Secure remote user access over insecure networks
    • Peyravian M., Jeffries C. Secure remote user access over insecure networks. Computer Communications 2006, 29(5):660-667.
    • (2006) Computer Communications , vol.29 , Issue.5 , pp. 660-667
    • Peyravian, M.1    Jeffries, C.2
  • 11
    • 33751177550 scopus 로고    scopus 로고
    • Security flaws of remote user access over insecure networks
    • Shim K.A. Security flaws of remote user access over insecure networks. Computer communications 2006, 30(1):117-121.
    • (2006) Computer communications , vol.30 , Issue.1 , pp. 117-121
    • Shim, K.A.1
  • 15
    • 51749125085 scopus 로고    scopus 로고
    • A new modified remote user authentication scheme using smartcards
    • Shen Z.H. A new modified remote user authentication scheme using smartcards. Applied Mathematics 2008, 23(3):371-376.
    • (2008) Applied Mathematics , vol.23 , Issue.3 , pp. 371-376
    • Shen, Z.H.1
  • 16
    • 44549086640 scopus 로고    scopus 로고
    • A new mutual authentication scheme based on nonce and smartcards
    • Jia Y.L., Jhou A.M., Gao M.X. A new mutual authentication scheme based on nonce and smartcards. Computer Communications 2008, 31(10):2205-2209.
    • (2008) Computer Communications , vol.31 , Issue.10 , pp. 2205-2209
    • Jia, Y.L.1    Jhou, A.M.2    Gao, M.X.3
  • 17
    • 43049128557 scopus 로고    scopus 로고
    • Efficient password authenticated key agreement using bilinear pairings
    • Juang W.S., Nien W.K. Efficient password authenticated key agreement using bilinear pairings. Mathematical and Computer Modelling 2008, 47(11-12):1238-1245.
    • (2008) Mathematical and Computer Modelling , vol.47 , Issue.11-12 , pp. 1238-1245
    • Juang, W.S.1    Nien, W.K.2
  • 18
    • 61849096169 scopus 로고    scopus 로고
    • More secure remote user authentication scheme
    • Kim S.K., Chung M.G. More secure remote user authentication scheme. Computer Communications 2009, 32(6):1018-1021.
    • (2009) Computer Communications , vol.32 , Issue.6 , pp. 1018-1021
    • Kim, S.K.1    Chung, M.G.2
  • 19
    • 64249125305 scopus 로고    scopus 로고
    • An improved smart card based password authentication scheme with provable security
    • Xu J., Zhu W.T., Feng D.G. An improved smart card based password authentication scheme with provable security. Computer Standards and Interfaces 2009, 31(4):723-728.
    • (2009) Computer Standards and Interfaces , vol.31 , Issue.4 , pp. 723-728
    • Xu, J.1    Zhu, W.T.2    Feng, D.G.3
  • 20
    • 84875286190 scopus 로고    scopus 로고
    • An enhanced remote user authentication scheme with smart card
    • Kumar M. An enhanced remote user authentication scheme with smart card. International Journal of Network Security 2010, 10(3):175-184.
    • (2010) International Journal of Network Security , vol.10 , Issue.3 , pp. 175-184
    • Kumar, M.1
  • 21
    • 70349792182 scopus 로고    scopus 로고
    • An efficient biometrics-based remote user authentication scheme using smart cards
    • Li C.T., Hwang M.S. An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications 2010, 33(1):1-5.
    • (2010) Journal of Network and Computer Applications , vol.33 , Issue.1 , pp. 1-5
    • Li, C.T.1    Hwang, M.S.2
  • 22
    • 34248666700 scopus 로고    scopus 로고
    • Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
    • Wang X.M., Zhang W.F., Zhang J.S., Khan M.K. Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Computer Standards and Interfaces 2007, 29:507-512.
    • (2007) Computer Standards and Interfaces , vol.29 , pp. 507-512
    • Wang, X.M.1    Zhang, W.F.2    Zhang, J.S.3    Khan, M.K.4
  • 23
    • 43649083106 scopus 로고    scopus 로고
    • Cryptanalysis of a password authentication scheme over insecure networks
    • Xiang T., Wong K.W., Liao X. Cryptanalysis of a password authentication scheme over insecure networks. Journal of Computer and System Sciences 2008, 74(5):657-661.
    • (2008) Journal of Computer and System Sciences , vol.74 , Issue.5 , pp. 657-661
    • Xiang, T.1    Wong, K.W.2    Liao, X.3
  • 24
    • 59649086399 scopus 로고    scopus 로고
    • Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards
    • Hsiang H.C., Shih W.K. Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards. Computer Communications 2009, 32(4):649-652.
    • (2009) Computer Communications , vol.32 , Issue.4 , pp. 649-652
    • Hsiang, H.C.1    Shih, W.K.2
  • 26
    • 64249169230 scopus 로고    scopus 로고
    • Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments
    • Chung H.R., Ku W.C., Tsaur M.J. Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments. Computer Standards and Interfaces 2009, 31(4):863-868.
    • (2009) Computer Standards and Interfaces , vol.31 , Issue.4 , pp. 863-868
    • Chung, H.R.1    Ku, W.C.2    Tsaur, M.J.3
  • 29
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • Messerges T.S., Dabbish E.A., Sloan R.H. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002, 51(5):541-552.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 33
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Boneh D., Franklin M. Identity-based encryption from the Weil pairing. SIAM Journal on Computing 2003, 32:586-615.
    • (2003) SIAM Journal on Computing , vol.32 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 34
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Boneh D., Lynn B., Shacham H. Short signatures from the Weil pairing. Journal of Cryptology 2004, 17(4):297-319.
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 35
    • 23044474013 scopus 로고    scopus 로고
    • Evidence that XTR is more secure than supersingular elliptic curve cryptosystems
    • Verheul E.R. Evidence that XTR is more secure than supersingular elliptic curve cryptosystems. Journal of Cryptology 2004, 17(4):277-296.
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 277-296
    • Verheul, E.R.1
  • 36
    • 68849128250 scopus 로고    scopus 로고
    • Improvement of the secure dynamic ID based remote user authenticationnext term scheme for multi-server environment
    • Hsiang H.C., Shiha W.K. Improvement of the secure dynamic ID based remote user authenticationnext term scheme for multi-server environment. Computer Standards and Interfaces 2009, 31(6):1118-1123.
    • (2009) Computer Standards and Interfaces , vol.31 , Issue.6 , pp. 1118-1123
    • Hsiang, H.C.1    Shiha, W.K.2
  • 37
    • 76349104839 scopus 로고    scopus 로고
    • Cryptanalysis of a remote user authentication scheme based on bilinear pairing
    • Yan Y.H., Wang D.S., Li J.P., Li L.G. Cryptanalysis of a remote user authentication scheme based on bilinear pairing. In: IEEE ICACIA 2009, 73-76.
    • (2009) In: IEEE ICACIA , pp. 73-76
    • Yan, Y.H.1    Wang, D.S.2    Li, J.P.3    Li, L.G.4
  • 38
    • 78651562638 scopus 로고    scopus 로고
    • Cryptanalysis of identity-based authenticated key agreement protocols from parings
    • Hou M., Xu Q., Shanqing G., Jiang H. Cryptanalysis of identity-based authenticated key agreement protocols from parings. Journal of Networks 2010, 5(7):826-855.
    • (2010) Journal of Networks , vol.5 , Issue.7 , pp. 826-855
    • Hou, M.1    Xu, Q.2    Shanqing, G.3    Jiang, H.4
  • 39
    • 70350437139 scopus 로고    scopus 로고
    • Security in key agreement: two-party certificateless schemes
    • Master's thesis, University of Waterloo, Canada
    • C.M. Swanson, Security in key agreement: two-party certificateless schemes, Master's thesis, University of Waterloo, Canada, 2008.
    • (2008)
    • Swanson, C.M.1
  • 40
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key exchange protocols and their use for building secure channels
    • Springer-Verlag, LNCS
    • R. Canetti, H. Krawczyk, Analysis of key exchange protocols and their use for building secure channels, In: Proceedings of Advances in Cryptology-Eurocrypt'01, Springer-Verlag, LNCS, 2001, pp. 453-474.
    • (2001) Proceedings of Advances in Cryptology-Eurocrypt'01 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 41
    • 38149061118 scopus 로고    scopus 로고
    • On the indistinguishability-based security model of key agreement protocols-simple cases
    • Cryptology ePrint Archieve, Report 2005/129
    • Z. Cheng, M. Nistazakis, R. Comley, L. Vasiu, On the indistinguishability-based security model of key agreement protocols-simple cases, Cryptology ePrint Archieve, Report 2005/129, 2005.
    • (2005)
    • Cheng, Z.1    Nistazakis, M.2    Comley, R.3    Vasiu, L.4
  • 42
    • 49949116357 scopus 로고    scopus 로고
    • Certificateless authenticated two-party key agreement protocols
    • Springer-Verlag, LNCS
    • T. Mandt, C. Tan, Certificateless authenticated two-party key agreement protocols, in: Proceedings of the ASIAN 2006, Springer-Verlag, LNCS, 4435, 2008, pp. 37-44.
    • (2008) Proceedings of the ASIAN 2006 , vol.4435 , pp. 37-44
    • Mandt, T.1    Tan, C.2
  • 43
    • 0141642166 scopus 로고    scopus 로고
    • On the security of some password authentication protocols
    • Hsieh B.T, Sun H.M., Hwang T. On the security of some password authentication protocols. Informatica 2003, 14(2):195-204.
    • (2003) Informatica , vol.14 , Issue.2 , pp. 195-204
    • Hsieh, B.T.1    Sun, H.M.2    Hwang, T.3
  • 45
    • 34548129922 scopus 로고    scopus 로고
    • ID-based digital signature scheme on the elliptic curve cryptosystem
    • Chung Y.F., Huang K.H., Lai F., Chen T.S. ID-based digital signature scheme on the elliptic curve cryptosystem. Computer Standards and Interfaces 2007, 29(6):601-604.
    • (2007) Computer Standards and Interfaces , vol.29 , Issue.6 , pp. 601-604
    • Chung, Y.F.1    Huang, K.H.2    Lai, F.3    Chen, T.S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.