메뉴 건너뛰기




Volumn 8, Issue 2, 2015, Pages 245-260

An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity

Author keywords

Authentication key exchange; Password; Smart card; Strong forward security; User anonymity

Indexed keywords

CRYPTOGRAPHY; GEOMETRY; SMART CARDS;

EID: 84919348312     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.977     Document Type: Article
Times cited : (35)

References (48)
  • 7
    • 80053379375 scopus 로고    scopus 로고
    • A robust remote user authentication scheme using smart card
    • Li CT, Lee CC. A robust remote user authentication scheme using smart card. Information Technology and Control 2011; 40(3): 236-245.
    • (2011) Information Technology and Control , vol.40 , Issue.3 , pp. 236-245
    • Li, C.T.1    Lee, C.C.2
  • 8
    • 84869789541 scopus 로고    scopus 로고
    • Security enhancements of an improved timestamp-based remote user authentication scheme
    • SecTech, CA, CES3 2012, Springer, Jeju Island, Korea
    • An Y. Security enhancements of an improved timestamp-based remote user authentication scheme, International Conferences, SecTech, CA, CES3 2012, Springer, Jeju Island, Korea, 2012; 54-61.
    • (2012) International Conferences , pp. 54-61
    • An, Y.1
  • 9
    • 84860659191 scopus 로고    scopus 로고
    • Mobile device integration of a fingerprint biometric remote authentication scheme
    • Chen CL, Lee CC, Hsu CY. Mobile device integration of a fingerprint biometric remote authentication scheme. International Journal of Communication Systems 2012; 25(5): 585-597.
    • (2012) International Journal of Communication Systems , vol.25 , Issue.5 , pp. 585-597
    • Chen, C.L.1    Lee, C.C.2    Hsu, C.Y.3
  • 10
    • 84892506781 scopus 로고    scopus 로고
    • Design of improved password authentication and update scheme based on elliptic curve cryptography
    • Hafizul Islam S, Biswas G. Design of improved password authentication and update scheme based on elliptic curve cryptography. Mathematical and Computer Modelling 2013; 57(11-12): 2703C2717.
    • (2013) Mathematical and Computer Modelling , vol.57 , Issue.11-12 , pp. 2703C2717
    • Hafizul Islam, S.1    Biswas, G.2
  • 11
    • 78650459565 scopus 로고    scopus 로고
    • An enhanced two-factor user authentication scheme in wireless sensor networks
    • He D, Gao Y, Chan S, Chen C, Bu J. An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks 2010; 10(4): 361-371.
    • (2010) Ad Hoc & Sensor Wireless Networks , vol.10 , Issue.4 , pp. 361-371
    • He, D.1    Gao, Y.2    Chan, S.3    Chen, C.4    Bu, J.5
  • 12
    • 84866619118 scopus 로고    scopus 로고
    • An improved efficient remote password authentication scheme with smart card over insecure networks
    • Kumar M, Gupta MK, Kumari S. An improved efficient remote password authentication scheme with smart card over insecure networks. International Journal of Network Security 2011; 13(3): 167-177.
    • (2011) International Journal of Network Security , vol.13 , Issue.3 , pp. 167-177
    • Kumar, M.1    Gupta, M.K.2    Kumari, S.3
  • 13
    • 84865010577 scopus 로고    scopus 로고
    • A strong password-based remote mutual authentication with key agreement scheme on elliptic curve cryptosystem for portable devices
    • Li X, Wen F, Cui S. A strong password-based remote mutual authentication with key agreement scheme on elliptic curve cryptosystem for portable devices. Applied Mathematics 2012; 6(2): 217-222.
    • (2012) Applied Mathematics , vol.6 , Issue.2 , pp. 217-222
    • Li, X.1    Wen, F.2    Cui, S.3
  • 14
    • 84877844458 scopus 로고    scopus 로고
    • A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card
    • Li CT. A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card. IET Information Security 2013; 7(1): 3-10.
    • (2013) IET Information Security , vol.7 , Issue.1 , pp. 3-10
    • Li, C.T.1
  • 15
    • 84911957404 scopus 로고    scopus 로고
    • Efficient and flexible password authenticated key agreement for voice over internet protocol session initiation protocol using smart card
    • Zhang L, Tang S, Cai Z. Efficient and flexible password authenticated key agreement for voice over internet protocol session initiation protocol using smart card. International Journal of Communication Systems 2013; doi:10.1002/dac.2499.
    • (2013) International Journal of Communication Systems
    • Zhang, L.1    Tang, S.2    Cai, Z.3
  • 16
    • 84860614830 scopus 로고    scopus 로고
    • A new dynamic ID-based remote user authentication scheme with forward secrecy
    • Web Technologies and Applications, Springer, Kunming, China
    • Ma C, Wang D, Zhao P, Wang Y. A new dynamic ID-based remote user authentication scheme with forward secrecy, The 2nd International Workshop on Mobile Business Collaboration. Web Technologies and Applications, Springer, Kunming, China, 2012; 99-211.
    • (2012) The 2nd International Workshop on Mobile Business Collaboration , pp. 99-211
    • Ma, C.1    Wang, D.2    Zhao, P.3    Wang, Y.4
  • 17
    • 84863056589 scopus 로고    scopus 로고
    • Robust smart-cards-based user authentication scheme with user anonymity
    • Wu S, Zhu Y, Pu Q. Robust smart-cards-based user authentication scheme with user anonymity. Security and Communication Networks 2012; 5(2): 236-248.
    • (2012) Security and Communication Networks , vol.5 , Issue.2 , pp. 236-248
    • Wu, S.1    Zhu, Y.2    Pu, Q.3
  • 18
    • 77955312905 scopus 로고    scopus 로고
    • Advanced smart card based password authentication protocol
    • Song R. Advanced smart card based password authentication protocol. Computer Standards & Interfaces 2010; 32(5): 321-325.
    • (2010) Computer Standards & Interfaces , vol.32 , Issue.5 , pp. 321-325
    • Song, R.1
  • 20
    • 84875308433 scopus 로고    scopus 로고
    • A robust and efficient timestamp-based remote user authentication scheme with smart card lost attack resistance
    • Tang H, Liu X, Jiang L. A robust and efficient timestamp-based remote user authentication scheme with smart card lost attack resistance. International Journal of Network Security 2013; 15(6): 360-368.
    • (2013) International Journal of Network Security , vol.15 , Issue.6 , pp. 360-368
    • Tang, H.1    Liu, X.2    Jiang, L.3
  • 22
    • 84876784827 scopus 로고    scopus 로고
    • A simple and robust anonymous two-factor authenticated key exchange protocol
    • Li X, Zhang Y. A simple and robust anonymous two-factor authenticated key exchange protocol. Security and Communication Networks 2013; 6(6): 711-722.
    • (2013) Security and Communication Networks , vol.6 , Issue.6 , pp. 711-722
    • Li, X.1    Zhang, Y.2
  • 23
    • 84874023543 scopus 로고    scopus 로고
    • Secure password-based remote user authentication scheme against smart card security breach
    • Wang D, Ma C, Zhang Q, Zhao S. Secure password-based remote user authentication scheme against smart card security breach. Journal of Networks 2013; 8(1): 148-155.
    • (2013) Journal of Networks , vol.8 , Issue.1 , pp. 148-155
    • Wang, D.1    Ma, C.2    Zhang, Q.3    Zhao, S.4
  • 24
    • 84872108080 scopus 로고    scopus 로고
    • A privacy enhanced authentication scheme for telecare medical information systems
    • Jiang Q, Ma J, Ma Z, Li G. A privacy enhanced authentication scheme for telecare medical information systems. Journal of Medical Systems 2013; 37(1): 9897. DOI: 10.1007/s10916-012-9897-0.
    • (2013) Journal of Medical Systems , vol.37 , Issue.1 , pp. 9897
    • Jiang, Q.1    Ma, J.2    Ma, Z.3    Li, G.4
  • 25
    • 84879448131 scopus 로고    scopus 로고
    • Security analysis and improvement of a privacy authentication scheme for telecare medical information systems
    • Wu F, Xu L. Security analysis and improvement of a privacy authentication scheme for telecare medical information systems. Journal of medical systems 2013; 37(4): 9958. DOI: 10.1007/s10916-013-9958-z.
    • (2013) Journal of medical systems , vol.37 , Issue.4 , pp. 9958
    • Wu, F.1    Xu, L.2
  • 26
    • 84861748201 scopus 로고    scopus 로고
    • An extended chaotic maps-based key agreement protocol with user anonymity
    • Lee CC, Chen CL, Wu CY, Huang SY. An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dynamics 2012; 69(1-2): 79-87.
    • (2012) Nonlinear Dynamics , vol.69 , Issue.1-2 , pp. 79-87
    • Lee, C.C.1    Chen, C.L.2    Wu, C.Y.3    Huang, S.Y.4
  • 27
    • 84888642495 scopus 로고    scopus 로고
    • An extended chaotic maps based user authentication and privacy preserving scheme against dos attacks in pervasive and ubiquitous computing environments
    • Li CT, Lee CC, Weng CY. An extended chaotic maps based user authentication and privacy preserving scheme against dos attacks in pervasive and ubiquitous computing environments. Nonlinear Dynamics 2013; 74(4): 1133-1143.
    • (2013) Nonlinear Dynamics , vol.74 , Issue.4 , pp. 1133-1143
    • Li, C.T.1    Lee, C.C.2    Weng, C.Y.3
  • 29
    • 84860376061 scopus 로고    scopus 로고
    • Dynamic ID-based remote user password authentication schemes using smart cards: a review
    • Madhusudhan R, Mittal R. Dynamic ID-based remote user password authentication schemes using smart cards: a review. Journal of Network and Computer Applications 2012; 35(4): 1235-1248.
    • (2012) Journal of Network and Computer Applications , vol.35 , Issue.4 , pp. 1235-1248
    • Madhusudhan, R.1    Mittal, R.2
  • 30
    • 84867658174 scopus 로고    scopus 로고
    • On the security of an improved password authentication scheme based on ECC, 3rd International Conference on Information Computing and Applications, 2012
    • Springer, Chengde, China
    • Wang D, Ma C, Shi L, Wang Y. On the security of an improved password authentication scheme based on ECC, 3rd International Conference on Information Computing and Applications, 2012. Information Computing and Applications, Springer, Chengde, China, 2012; 181-188.
    • (2012) Information Computing and Applications , pp. 181-188
    • Wang, D.1    Ma, C.2    Shi, L.3    Wang, Y.4
  • 32
    • 84919402473 scopus 로고    scopus 로고
    • Three attacks on Jia 's remote user authentication scheme using bilinear pairings and ECC
    • Yoon EJ, Yoo KY. Three attacks on Jia et al.'s remote user authentication scheme using bilinear pairings and ECC. World Academy of Science, Engineering and Technology 2011; 60: 447-451.
    • (2011) World Academy of Science, Engineering and Technology , vol.60 , pp. 447-451
    • Yoon, E.J.1    Yoo, K.Y.2
  • 33
    • 84911988880 scopus 로고    scopus 로고
    • Security flaws in two improved remote user authentication schemes using smart cards
    • Ma C, Wang D, Zhao S. Security flaws in two improved remote user authentication schemes using smart cards. International Journal of Communication Systems 2012; doi:10.1002/dac.2468.
    • (2012) International Journal of Communication Systems
    • Ma, C.1    Wang, D.2    Zhao, S.3
  • 34
    • 84870350603 scopus 로고    scopus 로고
    • Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme
    • Tang H, Liu X. Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme. International Journal of Communication Systems 2012; 25(12): 1639-1644.
    • (2012) International Journal of Communication Systems , vol.25 , Issue.12 , pp. 1639-1644
    • Tang, H.1    Liu, X.2
  • 35
    • 84863497002 scopus 로고    scopus 로고
    • Cryptanalysis of Song's advanced smart card based password authentication protocol
    • arXiv preprint arXiv:1111.2744.
    • Tapiador JE, Hernandez-Castro JC, Peris-Lopez P, Clark JA. Cryptanalysis of Song's advanced smart card based password authentication protocol, 2011. arXiv preprint arXiv:1111.2744.
    • (2011)
    • Tapiador, J.E.1    Hernandez-Castro, J.C.2    Peris-Lopez, P.3    Clark, J.A.4
  • 37
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis. Advances in CryptologyłCRYPTO99
    • Springer, Santa Barbara, California, USA
    • Kocher P, Jaffe J, Jun B. Differential Power Analysis. Advances in CryptologyłCRYPTO99, 19th Annual International Cryptology Conference, Springer, Santa Barbara, California, USA, 1999; 388-397.
    • (1999) 19th Annual International Cryptology Conference , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 38
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • Messerges TS, Dabbish EA, Sloan RH. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51(5): 541-552.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 39
    • 79959430513 scopus 로고    scopus 로고
    • One for all-all for one: unifying standard differential power analysis attacks
    • Mangard S, Oswald E, Standaert FX. One for all-all for one: unifying standard differential power analysis attacks. IET Information Security 2011; 5(2): 100-110.
    • (2011) IET Information Security , vol.5 , Issue.2 , pp. 100-110
    • Mangard, S.1    Oswald, E.2    Standaert, F.X.3
  • 40
    • 84957794888 scopus 로고    scopus 로고
    • Forward secrecy and its application to future mobile communications security
    • Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000
    • Park D, Boyd C, Moon SJ. Forward secrecy and its application to future mobile communications security, Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, 2000; 433-445.
    • (2000) , pp. 433-445
    • Park, D.1    Boyd, C.2    Moon, S.J.3
  • 43
    • 33645601444 scopus 로고    scopus 로고
    • Authentication and key agreement via memorable password, ISOC Network and Distributed System Security Symposium
    • Citeseer
    • Kwon T. Authentication and key agreement via memorable password, ISOC Network and Distributed System Security Symposium, vol. 20, Citeseer, 2001; 31-33.
    • (2001) , vol.20 , pp. 31-33
    • Kwon, T.1
  • 44
    • 33750072402 scopus 로고    scopus 로고
    • Practical Authenticated Key Agreement Using Passwords. Information Security
    • ISC 2004, Springer, Palo Alto, CA, USA
    • Kwon T. Practical Authenticated Key Agreement Using Passwords. Information Security, 7th International Conference, ISC 2004, Springer, Palo Alto, CA, USA, 2004; 1-12.
    • (2004) 7th International Conference , pp. 1-12
    • Kwon, T.1
  • 46
    • 84906780088 scopus 로고    scopus 로고
    • An ID-based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem
    • Han W, Zhu Z. An ID-based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem. International Journal of Communication Systems 2012. DOI: 10.1002/dac.2405.
    • (2012) International Journal of Communication Systems
    • Han, W.1    Zhu, Z.2
  • 47
    • 84859767453 scopus 로고    scopus 로고
    • An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings
    • He D. An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings. Ad Hoc Networks 2012; 10(6): 1009-1016.
    • (2012) Ad Hoc Networks , vol.10 , Issue.6 , pp. 1009-1016
    • He, D.1
  • 48
    • 33750710411 scopus 로고    scopus 로고
    • Implementing Cryptographic Pairings on Smartcards, Cryptographic Hardware and Embedded Systems-CHES 2006, Springer, Yokohama, Japan
    • Scott M, Costigan N, Abdulwahab W. Implementing Cryptographic Pairings on Smartcards, Cryptographic Hardware and Embedded Systems-CHES 2006, Springer, Yokohama, Japan, 2006; 134-147.
    • (2006) , pp. 134-147
    • Scott, M.1    Costigan, N.2    Abdulwahab, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.