메뉴 건너뛰기




Volumn 29, Issue 17, 2016, Pages 2442-2456

Provably secure and pairing-free identity-based handover authentication protocol for wireless mobile networks

Author keywords

anonymity; handover authentication; provable security; unlinkability; wireless networks

Indexed keywords

AUTHENTICATION; DENIAL-OF-SERVICE ATTACK; HASH FUNCTIONS; PUBLIC KEY CRYPTOGRAPHY; WIRELESS NETWORKS;

EID: 84908249445     PISSN: 10745351     EISSN: 10991131     Source Type: Journal    
DOI: 10.1002/dac.2847     Document Type: Article
Times cited : (27)

References (42)
  • 1
    • 79959763451 scopus 로고    scopus 로고
    • Cryptanalysis of Hsiang–Shih's authentication scheme for multi-server architecture
    • Yeh KH, Lo NW, Li YJ. Cryptanalysis of Hsiang–Shih's authentication scheme for multi-server architecture. International Journal of Communication Systems 2011; 24(7):829–836.
    • (2011) International Journal of Communication Systems , vol.24 , Issue.7 , pp. 829-836
    • Yeh, K.H.1    Lo, N.W.2    Li, Y.J.3
  • 3
    • 84870350603 scopus 로고    scopus 로고
    • Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme
    • Tang HB, Liu XS. Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme. International Journal of Communication Systems 2012; 25(12):1639–1644.
    • (2012) International Journal of Communication Systems , vol.25 , Issue.12 , pp. 1639-1644
    • Tang, H.B.1    Liu, X.S.2
  • 4
    • 84879602205 scopus 로고    scopus 로고
    • Efficient three-party key exchange protocols with round efficiency
    • Youn T-Y, Kang E, Lee C. Efficient three-party key exchange protocols with round efficiency. Telecommunication Systems 2013; 52(2):1367–1376.
    • (2013) Telecommunication Systems , vol.52 , Issue.2 , pp. 1367-1376
    • Youn, T.-Y.1    Kang, E.2    Lee, C.3
  • 5
    • 84859161671 scopus 로고    scopus 로고
    • Towards generalized ID-based user authentication for mobile multi-server environment
    • Chuang YH, Tseng Y-M. Towards generalized ID-based user authentication for mobile multi-server environment. International Journal of Communication Systems 2012; 25(4):447–460.
    • (2012) International Journal of Communication Systems , vol.25 , Issue.4 , pp. 447-460
    • Chuang, Y.H.1    Tseng, Y.-M.2
  • 6
    • 84988227377 scopus 로고    scopus 로고
    • Improvement of robust smart-card-based password authentication scheme
    • posted on, to appear in print)
    • Jian Q, Ma J, Li G. Improvement of robust smart-card-based password authentication scheme. International Journal of Communication Systems posted on 2013. DOI 10.1002/dac.2644, (to appear in print).
    • (2013) International Journal of Communication Systems
    • Jian, Q.1    Ma, J.2    Li, G.3
  • 8
    • 84899037889 scopus 로고    scopus 로고
    • Design and analysis of an improved smartcard based remote user password authentication scheme
    • posted on, to appear in print)
    • Islam SH. Design and analysis of an improved smartcard based remote user password authentication scheme. International Journal of Communication Systems posted on 2014. DOI 10.1002/dac.2793, (to appear in print).
    • (2014) International Journal of Communication Systems
    • Islam, S.H.1
  • 9
    • 84922001116 scopus 로고    scopus 로고
    • Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks
    • posted on 2014. to appear in print)
    • He D, Kumar K, Khan MK. Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks. Multimedia Systems posted on 2014. DOI 10.1007/s00530-013-0346-9, (to appear in print).
    • Multimedia Systems
    • He, D.1    Kumar, K.2    Khan, M.K.3
  • 10
    • 85027949488 scopus 로고    scopus 로고
    • Robust biometrics-based authentication scheme for multi-server environment
    • posted on, to appear in print)
    • He D, Wang D. Robust biometrics-based authentication scheme for multi-server environment. IEEE Systems Journal posted on 2014. DOI 10.1109/JSYST.2014.2301517, (to appear in print).
    • (2014) IEEE Systems Journal
    • He, D.1    Wang, D.2
  • 11
    • 84898048082 scopus 로고    scopus 로고
    • Enhanced three-factor security protocol for USB consumer storage devices
    • He D, Kumar N, Lee J-H. Enhanced three-factor security protocol for USB consumer storage devices. IEEE Transactions on Consumer Electronics 2014; 60(1):30–37.
    • (2014) IEEE Transactions on Consumer Electronics , vol.60 , Issue.1 , pp. 30-37
    • He, D.1    Kumar, N.2    Lee, J.-H.3
  • 12
    • 84891688392 scopus 로고    scopus 로고
    • Anonymous two-factor authentication for consumer roaming service in global mobility networks
    • He D, Kumar N, Khan MK, Lee J-H. Anonymous two-factor authentication for consumer roaming service in global mobility networks. IEEE Transactions on Consumer Electronics (2013) 2013; 59(4):811–817.
    • (2013) IEEE Transactions on Consumer Electronics (2013) , vol.59 , Issue.4 , pp. 811-817
    • He, D.1    Kumar, N.2    Khan, M.K.3    Lee, J.-H.4
  • 13
    • 84911988880 scopus 로고    scopus 로고
    • Security flaws in two improved remote user authentication schemes using smart cards
    • posted on, to appear in print)
    • Ma C-G, Wang D, Zhao S-D. Security flaws in two improved remote user authentication schemes using smart cards. International Journal of Communication Systems, posted on 2012. DOI 10.1002/dac.2468, (to appear in print).
    • (2012) International Journal of Communication Systems
    • Ma, C.-G.1    Wang, D.2    Zhao, S.-D.3
  • 15
    • 84914669082 scopus 로고    scopus 로고
    • Robust smartcard-based remote user password authentication scheme
    • posted on, to appear in print)
    • Kumari S, Khan MK. Robust smartcard-based remote user password authentication scheme. International Journal of Communication Systems posted on 2013. DOI 10.1002/dac.2590, (to appear in print).
    • (2013) International Journal of Communication Systems
    • Kumari, S.1    Khan, M.K.2
  • 16
    • 84856471625 scopus 로고    scopus 로고
    • Secure and efficient handover authentication based on bilinear pairing functions
    • He D, Chen C, Chan S, Bu J. Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communication 2012; 11(1):48–53.
    • (2012) IEEE Transactions on Wireless Communication , vol.11 , Issue.1 , pp. 48-53
    • He, D.1    Chen, C.2    Chan, S.3    Bu, J.4
  • 17
    • 84865443877 scopus 로고    scopus 로고
    • Analysis and improvement of a secure and efficient handover authentication for wireless networks
    • He D, Chen C, Chan S, Bu J. Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Communications Letters 2012; 16(8):1270–1273.
    • (2012) IEEE Communications Letters , vol.16 , Issue.8 , pp. 1270-1273
    • He, D.1    Chen, C.2    Chan, S.3    Bu, J.4
  • 18
    • 84890563211 scopus 로고    scopus 로고
    • Secure handover authentication protocol based on bilinear pairings
    • posted on, (to appear in print)
    • Tsai J-L, Lo N-W, Wu T-C. Secure handover authentication protocol based on bilinear pairings. Wireless Personal Communications posted on 2013. DOI: 10.1007/s11277-013-1246-1, (to appear in print).
    • (2013) Wireless Personal Communications
    • Tsai, J.-L.1    Lo, N.-W.2    Wu, T.-C.3
  • 20
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
    • Pohlig S, Hellman M. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Transactions on Information Theory 1978; 24:106–110.
    • (1978) IEEE Transactions on Information Theory , vol.24 , pp. 106-110
    • Pohlig, S.1    Hellman, M.2
  • 21
    • 77954639466 scopus 로고    scopus 로고
    • Converting pairing-based cryptosystems from composite-order groups to primeorder groups
    • French Riviera, Franc
    • Freeman DM. Converting pairing-based cryptosystems from composite-order groups to primeorder groups. Proceedings of the Advances in Cryptology (EUROCRYPT'10), French Riviera, France, Vol. 6110, 2010; 44–61.
    • (2010) Proceedings of the Advances in Cryptology (EUROCRYPT'10) , vol.6110 , pp. 44-61
    • Freeman, D.M.1
  • 22
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Boneh D, Franklin M. Identity-based encryption from the Weil pairing. SIAM Journal on Computing 2003; 32(3):586–615.
    • (2003) SIAM Journal on Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 24
    • 84879603468 scopus 로고    scopus 로고
    • Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network
    • Wang X, Guo W, Zhang W, Khan MK, Alghathbar K. Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network. Telecommunication Systems 2013; 52(2):515–524.
    • (2013) Telecommunication Systems , vol.52 , Issue.2 , pp. 515-524
    • Wang, X.1    Guo, W.2    Zhang, W.3    Khan, M.K.4    Alghathbar, K.5
  • 25
    • 84889263311 scopus 로고    scopus 로고
    • Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography
    • Islam HS, Biswas GP. Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography. International Journal of Computer Mathematics 2013; 90(11):2244–2258.
    • (2013) International Journal of Computer Mathematics , vol.90 , Issue.11 , pp. 2244-2258
    • Islam, H.S.1    Biswas, G.P.2
  • 26
    • 84870878817 scopus 로고    scopus 로고
    • A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks
    • Islam HS, Biswas GP. A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks. Annals of Telecommunications 2012; 67(11-12):547–558.
    • (2012) Annals of Telecommunications , vol.67 , Issue.11-12 , pp. 547-558
    • Islam, H.S.1    Biswas, G.P.2
  • 30
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • Pointcheval D, Stern J. Security arguments for digital signatures and blind signatures. Journal of Cryptology 2000; 13:361–396.
    • (2000) Journal of Cryptology , vol.13 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2
  • 31
    • 0000537828 scopus 로고
    • Efficient identification and signatures for smart cards
    • Houthalen, Belgiu
    • Schnorr CP. Efficient identification and signatures for smart cards. Proceedings of the Cryptology (Crypto'89), Houthalen, Belgium, Vol. 435, 1990; 239–251.
    • (1990) Proceedings of the Cryptology (Crypto'89) , vol.435 , pp. 239-251
    • Schnorr, C.P.1
  • 32
    • 54449094667 scopus 로고    scopus 로고
    • A secure dynamic ID based remote user authentication scheme for multi-server environment
    • Liao YP, Wang SS. A secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces 2009; 31(1):24–29.
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.1 , pp. 24-29
    • Liao, Y.P.1    Wang, S.S.2
  • 33
    • 68849128250 scopus 로고    scopus 로고
    • Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
    • Hsiang HC, Shih WK. Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces 2009; 31(6):1118–1123.
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.6 , pp. 1118-1123
    • Hsiang, H.C.1    Shih, W.K.2
  • 34
    • 78751648745 scopus 로고    scopus 로고
    • A strong user authentication scheme with smart cards for wireless communications
    • He D, Ma M, Zhang Y, Chen C, Bu J. A strong user authentication scheme with smart cards for wireless communications. Computer Communication 2011; 34(3):367–374.
    • (2011) Computer Communication , vol.34 , Issue.3 , pp. 367-374
    • He, D.1    Ma, M.2    Zhang, Y.3    Chen, C.4    Bu, J.5
  • 35
    • 67651062654 scopus 로고    scopus 로고
    • A secure and efficient handover authentication based on light-weight Diffie–Hellman on mobile node in FMIPv6
    • Choi J, Jung S. A secure and efficient handover authentication based on light-weight Diffie–Hellman on mobile node in FMIPv6. IEICE Transactions on Communications 2008; E-91B(2):605–608.
    • (2008) IEICE Transactions on Communications , vol.E-91B , Issue.2 , pp. 605-608
    • Choi, J.1    Jung, S.2
  • 37
    • 75449110407 scopus 로고    scopus 로고
    • A handover authentication using credentials based on chameleon hashing
    • Choi J, Jung S. A handover authentication using credentials based on chameleon hashing. IEEE Communications Letters 2010; 14(1):54–56.
    • (2010) IEEE Communications Letters , vol.14 , Issue.1 , pp. 54-56
    • Choi, J.1    Jung, S.2
  • 39
    • 79951676054 scopus 로고    scopus 로고
    • Privacy-preserving universal authentication protocol for wireless communications
    • He D, Bu J, Chan S, Chen C, Yin M. Privacy-preserving universal authentication protocol for wireless communications. IEEE Transactions on Wireless Communications 2011; 10(2):431–436.
    • (2011) IEEE Transactions on Wireless Communications , vol.10 , Issue.2 , pp. 431-436
    • He, D.1    Bu, J.2    Chan, S.3    Chen, C.4    Yin, M.5
  • 41
    • 84855353789 scopus 로고    scopus 로고
    • An ID-based proxy signature schemes without bilinear pairings
    • He D, Chen J, Hu J. An ID-based proxy signature schemes without bilinear pairings. Annals of Telecommunications 2011; 66(11-12):657–662.
    • (2011) Annals of Telecommunications , vol.66 , Issue.11-12 , pp. 657-662
    • He, D.1    Chen, J.2    Hu, J.3
  • 42
    • 84969991717 scopus 로고    scopus 로고
    • 2nd edn, Encyclopedia of Cryptography and Security, Springer, US
    • Solinas JA. Generalized Mersenne Prime (2nd edn), Encyclopedia of Cryptography and Security. Springer: USA, 2011; 509–510.
    • (2011) Generalized Mersenne Prime , pp. 509-510
    • Solinas, J.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.