메뉴 건너뛰기




Volumn 43, Issue 4, 2014, Pages 390-401

An efficient password authentication scheme using smart card based on elliptic curve cryptography

Author keywords

Attack; Elliptic curve cryptography; Password authentication; Smart card

Indexed keywords


EID: 84919397560     PISSN: 1392124X     EISSN: None     Source Type: Journal    
DOI: 10.5755/j01.itc.43.4.6579     Document Type: Article
Times cited : (7)

References (19)
  • 1
    • 36349014859 scopus 로고    scopus 로고
    • A new method for using hash functions to solve remote user authentication
    • Tzung-Her Chen, Wei-Bin Lee. A new method for using hash functions to solve remote user authentication. Computers & Electrical Engineering, 2008, Vol. 34, No. 1, 53-62.
    • (2008) Computers & Electrical Engineering , vol.34 , Issue.1 , pp. 53-62
    • Chen, T.-H.1    Lee, W.-B.2
  • 2
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication: Smart card
    • H. Y. Chien, J. K. Jan, Y. M. Tseng. An efficient and practical solution to remote authentication: smart card. Computers & Security, 2002, Vol. 21, No. 4, 372–375.
    • (2002) Computers & Security , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.Y.1    Jan, J.K.2    Tseng, Y.M.3
  • 3
    • 0742268499 scopus 로고    scopus 로고
    • Security of Chien et al.’s remote user authentication scheme using smart cards
    • C. L. Hsu. Security of Chien et al.’s remote user authentication scheme using smart cards. Computer Standards & Interfaces, 2004, Vol. 26, No. 3, 167–169.
    • (2004) Computer Standards & Interfaces , vol.26 , Issue.3 , pp. 167-169
    • Hsu, C.L.1
  • 4
    • 79959762596 scopus 로고    scopus 로고
    • Secure smart card based password authentication scheme with user anonymity
    • C. T. Li. Secure smart card based password authentication scheme with user anonymity. Information Technology and Control, 2011, Vol. 40, No. 2, 157–162.
    • (2011) Information Technology and Control , vol.40 , Issue.2 , pp. 157-162
    • Li, C.T.1
  • 5
    • 77955312905 scopus 로고    scopus 로고
    • Advanced smart card based password authentication protocol
    • R. Song. Advanced smart card based password authentication protocol. Computer Standards & Interfaces, 2010, Vol. 32, No. (5–6), 321–325.
    • (2010) Computer Standards & Interfaces , vol.32 , Issue.56 , pp. 321-325
    • Song, R.1
  • 6
    • 78751645363 scopus 로고    scopus 로고
    • Robust authentication and key agreement scheme preserving the privacy of secret key
    • R. C. Wang, W. S. Juang, C. L. Lei. Robust authentication and key agreement scheme preserving the privacy of secret key. Computer Communications, 2011, Vol. 34, No. 3, 274–280.
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 274-280
    • Wang, R.C.1    Juang, W.S.2    Lei, C.L.3
  • 7
    • 84863369937 scopus 로고    scopus 로고
    • Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme
    • H. Wang, Y. Zhang, H. Xiong, B. Qin. Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme. IET Information Security, 2012, Vol. 6, No. 1, 20–27.
    • (2012) IET Information Security , vol.6 , Issue.1 , pp. 20-27
    • Wang, H.1    Zhang, Y.2    Xiong, H.3    Qin, B.4
  • 8
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport. Password authentication with insecure communication. Communications of ACM, 1981, Vol. 24, No. 11, 770-772.
    • (1981) Communications of ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 10
    • 84860996400 scopus 로고    scopus 로고
    • One-round identity-based key exchange with Perfect Forward Security
    • Min Xie, Libin Wang. One-round identity-based key exchange with Perfect Forward Security. Information Processing Letters, 2012, Vol. 112, No. 14-15, 587-591.
    • (2012) Information Processing Letters , vol.112 , Issue.14-15 , pp. 587-591
    • Xie, M.1    Wang, L.2
  • 11
    • 84859178298 scopus 로고    scopus 로고
    • A secure and efficiency ID-based authenticated key agreement scheme based on elliptic curve cryptosystem foe mobile devices
    • Eun-Jun Yoon, Sung-Bae Choi, Kee-Young Yoo. A secure and efficiency ID-based authenticated key agreement scheme based on elliptic curve cryptosystem foe mobile devices. International Journal of Innovative Computing Information and Control, 2012, Vol. 8, No. 4, 2637-2653.
    • (2012) International Journal of Innovative Computing Information and Control , vol.8 , Issue.4 , pp. 2637-2653
    • Yoon, E.-J.1    Choi, S.-B.2    Yoo, K.-Y.3
  • 13
    • 81855227196 scopus 로고    scopus 로고
    • Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
    • A. K. Das. Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Information Security, 2011, Vol. 5, No. 3, 145–151.
    • (2011) IET Information Security , vol.5 , Issue.3 , pp. 145-151
    • Das, A.K.1
  • 14
    • 33646477537 scopus 로고    scopus 로고
    • An efficient and complete remote user authentication scheme using smart cards
    • Horng-Twu Liaw, Jiann-Fu Lin, Wei-Chen Wu. An efficient and complete remote user authentication scheme using smart cards. Mathematical and Computer Modelling, 2006, Vol. 44, No. 1-2, 223-228.
    • (2006) Mathematical and Computer Modelling , vol.44 , Issue.1-2 , pp. 223-228
    • Liaw, H.-T.1    Lin, J.-F.2    Wei-Chen, W.3
  • 15
    • 84892506781 scopus 로고    scopus 로고
    • Design of improved password authentication and update scheme based on elliptic curve cryptography
    • S. H. Islam, G. P. Biswas. Design of improved password authentication and update scheme based on elliptic curve cryptography. Mathematical and Computer Modelling, 2013, Vol. 57, No. 11-12, 2703-2717.
    • (2013) Mathematical and Computer Modelling , vol.57 , Issue.11-12 , pp. 2703-2717
    • Islam, S.H.1    Biswas, G.P.2
  • 16
    • 0037282439 scopus 로고    scopus 로고
    • A password authentication scheme with secure password updating
    • C. L. Lin, T. Hwang. A password authentication scheme with secure password updating. Computers & Security, 2003, Vol. 22, No. 1, 68-72.
    • (2003) Computers & Security , vol.22 , Issue.1 , pp. 68-72
    • Lin, C.L.1    Hwang, T.2
  • 17
    • 84877844458 scopus 로고    scopus 로고
    • A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card
    • Chun-Ta Li. A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card. IET Information Security, 2013, Vol. 7, No. 1, 3-10.
    • (2013) IET Information Security , vol.7 , Issue.1 , pp. 3-10
    • Li, C.-T.1
  • 19
    • 84868014129 scopus 로고    scopus 로고
    • A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography
    • M. K. Khan, D. He. A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography. Security and Communication Networks, 2012, Vol. 5, No. 11, 1260-1266.
    • (2012) Security and Communication Networks , vol.5 , Issue.11 , pp. 1260-1266
    • Khan, M.K.1    He, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.