메뉴 건너뛰기




Volumn 79, Issue 3, 2014, Pages 1975-1991

A Provably Secure ID-Based Mutual Authentication and Key Agreement Scheme for Mobile Multi-Server Environment Without ESL Attack

Author keywords

Bilinear pairing; Elliptic curve cryptography; ESL attack; Hash function; ID based cryptography; Mobile client; Multi server authentication

Indexed keywords

AUTHENTICATION; HASH FUNCTIONS; PUBLIC KEY CRYPTOGRAPHY; RANDOM NUMBER GENERATION;

EID: 84920258664     PISSN: 09296212     EISSN: 1572834X     Source Type: Journal    
DOI: 10.1007/s11277-014-1968-8     Document Type: Article
Times cited : (59)

References (44)
  • 1
    • 84863310175 scopus 로고    scopus 로고
    • Cryptanalysis of an authenticated key agreement protocol for wireless mobile communications
    • He, D. (2012). Cryptanalysis of an authenticated key agreement protocol for wireless mobile communications. ETRI Journal, 34(3), 482–484.
    • (2012) ETRI Journal , vol.34 , Issue.3 , pp. 482-484
    • He, D.1
  • 2
    • 84859767453 scopus 로고    scopus 로고
    • An efficient remote user authentication and key exchange protocol for mobile client-server environment from pairings
    • He, D. (2012). An efficient remote user authentication and key exchange protocol for mobile client-server environment from pairings. Ad Hoc Networks, 10(6), 1009–1016.
    • (2012) Ad Hoc Networks , vol.10 , Issue.6 , pp. 1009-1016
    • He, D.1
  • 3
    • 80051571433 scopus 로고    scopus 로고
    • An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security
    • He, D., Chen, J., & Hu, J. (2012). An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Information Fusion, 13(3), 223–230.
    • (2012) Information Fusion , vol.13 , Issue.3 , pp. 223-230
    • He, D.1    Chen, J.2    Hu, J.3
  • 4
    • 84864058187 scopus 로고    scopus 로고
    • A more secure authentication scheme for telecare medicine information systems
    • He, D., Chen, J., & Zhang, R. (2012). A more secure authentication scheme for telecare medicine information systems. Journal of Medical Systems, 36(3), 1989–1995.
    • (2012) Journal of Medical Systems , vol.36 , Issue.3 , pp. 1989-1995
    • He, D.1    Chen, J.2    Zhang, R.3
  • 5
    • 84861369956 scopus 로고    scopus 로고
    • Further improvement of Juang et al. ’s password-authenticated key agreement scheme using smart cards
    • He, D., Chen, J., & Hu, J. (2011). Further improvement of Juang et al. ’s password-authenticated key agreement scheme using smart cards. Kuwait Journal of Science & Engineering, 38(2A), 55–68.
    • (2011) Kuwait Journal of Science & Engineering , vol.38 , Issue.2A , pp. 55-68
    • He, D.1    Chen, J.2    Hu, J.3
  • 6
    • 84878978708 scopus 로고    scopus 로고
    • Improvement on a smart card based password authentication scheme
    • He, D., Chen, J., & Hu, J. (2012). Improvement on a smart card based password authentication scheme. Journal of Internet Technology, 13(3), 405–410.
    • (2012) Journal of Internet Technology , vol.13 , Issue.3 , pp. 405-410
    • He, D.1    Chen, J.2    Hu, J.3
  • 7
    • 84863985527 scopus 로고    scopus 로고
    • A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Security and Communication Networks
    • He, D., Chen, J., & Chen, Y. (2012). A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Security and Communication Networks. doi:10.1002/sec.506.
    • (2012) doi:10.1002/sec.506
    • He, D.1    Chen, J.2    Chen, Y.3
  • 8
    • 84863989374 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
    • He, D., Chen, Y., & Chen, J. (2012). Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dynamics, 69(3), 1149–1157.
    • (2012) Nonlinear Dynamics , vol.69 , Issue.3 , pp. 1149-1157
    • He, D.1    Chen, Y.2    Chen, J.3
  • 9
    • 49849096355 scopus 로고    scopus 로고
    • Efficient multi-server authentication scheme based on one-way hash function without verification table
    • Tsai, J. L. (2008). Efficient multi-server authentication scheme based on one-way hash function without verification table. Computers and Security, 27(3–4), 115–121.
    • (2008) Computers and Security , vol.27 , Issue.3-4 , pp. 115-121
    • Tsai, J.L.1
  • 10
    • 56449110391 scopus 로고    scopus 로고
    • A dynamic ID-based user authentication and key agreement scheme for multi-server environment using bilinear pairings
    • Geng, J., & Zhang, L. (2008). A dynamic ID-based user authentication and key agreement scheme for multi-server environment using bilinear pairings. In Proceedings of the power electronics and intelligent transportation system, pp. 33–37.
    • (2008) In Proceedings of the power electronics and intelligent transportation system , pp. 33-37
    • Geng, J.1    Zhang, L.2
  • 11
    • 54449094667 scopus 로고    scopus 로고
    • A secure dynamic ID based remote user authentication scheme for multi-server environment
    • Liao, Y. P., & Wang, S. S. (2009). A secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards and Interfaces, 31(1), 24–29.
    • (2009) Computer Standards and Interfaces , vol.31 , Issue.1 , pp. 24-29
    • Liao, Y.P.1    Wang, S.S.2
  • 12
    • 68849128250 scopus 로고    scopus 로고
    • Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
    • Hsiang, H. C., & Shih, W. K. (2009). Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards and Interfaces, 31(6), 1118–1123.
    • (2009) Computer Standards and Interfaces , vol.31 , Issue.6 , pp. 1118-1123
    • Hsiang, H.C.1    Shih, W.K.2
  • 13
    • 79959970986 scopus 로고    scopus 로고
    • A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards
    • Lee, C.-C., Lin, T.-H., & Chang, R.-X. (2011). A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards. Expert Systems with Applications, 38, 13863–13870.
    • (2011) Expert Systems with Applications , vol.38 , pp. 13863-13870
    • Lee, C.-C.1    Lin, T.-H.2    Chang, R.-X.3
  • 14
    • 84859157438 scopus 로고    scopus 로고
    • Cryptanalysis of multiple-server password-authenticated key agreement scheme using smart cards
    • Lee, S. G. (2009). Cryptanalysis of multiple-server password-authenticated key agreement scheme using smart cards. Cryptology ePrint Archive 2009; Report 2009/490.
    • (2009) Cryptology ePrint Archive 2009; Report , vol.2009 , Issue.490
    • Lee, S.G.1
  • 15
    • 84859161961 scopus 로고    scopus 로고
    • Security weaknesses of two dynamic ID-based user authentication and key agreement schemes for multi-server environment
    • Chuang, Y. H., & Tseng, Y. M. (2009). Security weaknesses of two dynamic ID-based user authentication and key agreement schemes for multi-server environment. In Proceedings of the national computer symposium (NCS2009), vol. 5, pp. 250–257.
    • (2009) In Proceedings of the national computer symposium (NCS2009) , vol.5 , pp. 250-257
    • Chuang, Y.H.1    Tseng, Y.M.2
  • 16
    • 79251600218 scopus 로고    scopus 로고
    • A secure dynamic identity based authentication protocol for multi-server architecture
    • Sood, S. K., Sarje, A., & Singh, K. (2011). A secure dynamic identity based authentication protocol for multi-server architecture. Journal of Network and Computer Applications, 34, 609–618.
    • (2011) Journal of Network and Computer Applications , vol.34 , pp. 609-618
    • Sood, S.K.1    Sarje, A.2    Singh, K.3
  • 17
    • 84856217617 scopus 로고    scopus 로고
    • An efficient and secure dynamic identity based authentication protocol for multi-server architecture using smartcards
    • Li, X., Xiong, Y., Ma, J., & Wang, W. (2012). An efficient and secure dynamic identity based authentication protocol for multi-server architecture using smartcards. Journal of Network and Computer Applications, 35, 763–769.
    • (2012) Journal of Network and Computer Applications , vol.35 , pp. 763-769
    • Li, X.1    Xiong, Y.2    Ma, J.3    Wang, W.4
  • 18
    • 84920260421 scopus 로고    scopus 로고
    • (2012). Weaknesses of a dynamic identity based authentication protocol for multi-server architecture
    • Han, W. (2012). Weaknesses of a dynamic identity based authentication protocol for multi-server architecture. arXiv preprint archive 2012. http://arxiv.org/ftp/arxiv/papers/1201/1201.0883.pdf.
    • (2012) arXiv preprint archive
    • Han, W.1
  • 19
    • 84878597719 scopus 로고    scopus 로고
    • A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments
    • Li, X., Ma, J., Wang, W., Xiong, Y., & Zhang, J. (2013). A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Mathematical and Computer Modelling, 58, 85–95.
    • (2013) Mathematical and Computer Modelling , vol.58 , pp. 85-95
    • Li, X.1    Ma, J.2    Wang, W.3    Xiong, Y.4    Zhang, J.5
  • 20
    • 84920251950 scopus 로고    scopus 로고
    • (2013). An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment
    • Zhaoa, D., Peng, H., Li, S., & Yang, Y. (2013). An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment. arXiv preprint archive 2013. http://arxiv.org/pdf/1305.6350.pdf.
    • (2013) arXiv preprint archive
    • Zhaoa, D.1    Peng, H.2    Li, S.3    Yang, Y.4
  • 21
    • 84872324933 scopus 로고    scopus 로고
    • A smart card based efficient and secured multi-server authentication scheme
    • Wang, B., & Ma, M. (2013). A smart card based efficient and secured multi-server authentication scheme. Wireless Personal Communications, 68, 361–378.
    • (2013) Wireless Personal Communications , vol.68 , pp. 361-378
    • Wang, B.1    Ma, M.2
  • 22
    • 84876151110 scopus 로고    scopus 로고
    • Security flaws in a smart card based authentication scheme for multi-server environment
    • He, D., & Wu, S. (2013). Security flaws in a smart card based authentication scheme for multi-server environment. Wireless Personal Communications, 70, 323–329.
    • (2013) Wireless Personal Communications , vol.70 , pp. 323-329
    • He, D.1    Wu, S.2
  • 23
    • 84859161671 scopus 로고    scopus 로고
    • Towards generalized ID-based user authentication for mobile multi-server environment
    • Chuang, Y.-H., & Tseng, Y.-M. (2013). Towards generalized ID-based user authentication for mobile multi-server environment. Intrnational Journal of Communication Systems, 25, 447–406.
    • (2013) Intrnational Journal of Communication Systems , vol.25 , pp. 447-406
    • Chuang, Y.-H.1    Tseng, Y.-M.2
  • 24
    • 84906780088 scopus 로고    scopus 로고
    • An ID-based mutual authentication with key agreement protocol for multi-server environment on elliptic curve cryptosystem, Intrnational Journal of Communication Systems:
    • Han, W., & Zhu, Z. (2013). An ID-based mutual authentication with key agreement protocol for multi-server environment on elliptic curve cryptosystem. Intrnational Journal of Communication Systems. doi:10.1002/dac.2405.
    • (2013) & Zhu, Z
    • Han, W.1
  • 25
    • 33747592366 scopus 로고    scopus 로고
    • Breaking a remote user authentication scheme for multi-server architecture
    • Cao, X., & Zhong, S. (2006). Breaking a remote user authentication scheme for multi-server architecture. IEEE Communications Letters, 10(8), 580–581.
    • (2006) IEEE Communications Letters , vol.10 , Issue.8 , pp. 580-581
    • Cao, X.1    Zhong, S.2
  • 26
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes. In Proceedings of the advances in cryptology (CRYPTO’84), LNCS 196, Springer
    • Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Proceedings of the advances in cryptology (CRYPTO’84), LNCS 196, Springer, Berlin, pp. 47–53.
    • (1984) Berlin , pp. 47-53
    • Shamir, A.1
  • 27
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Boneh, D., & Franklin, M. (2003). Identity-based encryption from the Weil pairing. SIAM Journal on Computing, 32, 586–615.
    • (2003) SIAM Journal on Computing , vol.32 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 28
    • 85117425347 scopus 로고    scopus 로고
    • Leakage-free ID-based signature, The Computer Journal:
    • Tseng, Y.-M., Tsai, T.-T., & Huang, S.-S. (2013). Leakage-free ID-based signature. The Computer Journal. doi:10.1093/comjnl/bxt116.
    • (2013) & Huang, S.-S
    • Tseng, Y.-M.1    Tsai, T.-T.2
  • 29
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key exchange protocols and their use for building secure channels. In Proceedings of advances in cryptology (Eurocrypt’01)
    • Canetti, R., & Krawczyk, H. (2001). Analysis of key exchange protocols and their use for building secure channels. In Proceedings of advances in cryptology (Eurocrypt’01), LNCS, pp. 453–474.
    • (2001) LNCS , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 30
    • 38149061118 scopus 로고    scopus 로고
    • On the indistinguishability-based security model of key agreement protocols-simple cases, Cryptology ePrint Archieve
    • Cheng, Z., Nistazakis, M., Comley, R., & Vasiu, L. (2005). On the indistinguishability-based security model of key agreement protocols-simple cases, Cryptology ePrint Archieve, Report 2005/129.
    • (2005) Report , vol.2005 , Issue.129
    • Cheng, Z.1    Nistazakis, M.2    Comley, R.3    Vasiu, L.4
  • 31
    • 49949116357 scopus 로고    scopus 로고
    • Certificateless authenticated two-party key agreement protocols. In Proceedings of the ASIAN’08
    • Mandt, T., & Tan, C. (2008). Certificateless authenticated two-party key agreement protocols. In Proceedings of the ASIAN’08, LNCS 4435, pp. 37–44.
    • (2008) LNCS , vol.4435 , pp. 37-44
    • Mandt, T.1    Tan, C.2
  • 32
    • 80051564952 scopus 로고    scopus 로고
    • CCIS 191, Springer
    • Islam, S. H., & Biswas, G. P. (2011). Comments on ID-based client authentication with key agreement protocol on ECC for mobile client-server environment. In Proceedings of the international conference on advanced in computing and communications (ACC 2011), CCIS 191, Springer, Berlin, pp. 628–635.
    • (2011) Berlin , pp. 628-635
  • 33
    • 80052774690 scopus 로고    scopus 로고
    • A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
    • Islam, S. H., & Bisws, G. P. (2011). A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Journal of Systems and Software, 84, 1892–1898.
    • (2011) Journal of Systems and Software , vol.84 , pp. 1892-1898
    • Islam, S.H.1    Bisws, G.P.2
  • 35
    • 70350437139 scopus 로고    scopus 로고
    • Security in key agreement: Two-party certificateless schemes
    • University of Waterloo, Canada:
    • Swanson, C. M. (2008). Security in key agreement: Two-party certificateless schemes. Master’s thesis, University of Waterloo, Canada.
    • (2008) Master’s thesis
    • Swanson, C.M.1
  • 36
    • 84892506781 scopus 로고    scopus 로고
    • Design of improved password authentication and update scheme based on elliptic curve cryptography
    • Islam, S. H., & Biswas, G. P. (2013). Design of improved password authentication and update scheme based on elliptic curve cryptography. Mathematical and Computer Modelling, 57, 2703–2717.
    • (2013) Mathematical and Computer Modelling , vol.57 , pp. 2703-2717
    • Islam, S.H.1    Biswas, G.P.2
  • 37
    • 84870878817 scopus 로고    scopus 로고
    • A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks
    • Islam, S. H., & Biswas, G. P. (2012). A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks. Annals of Telecommunications, 67(11–12), 547–558.
    • (2012) Annals of Telecommunications , vol.67 , Issue.11-12 , pp. 547-558
    • Islam, S.H.1    Biswas, G.P.2
  • 38
    • 78651562638 scopus 로고    scopus 로고
    • Cryptanalysis of identity-based authenticated key agreement protocols from parings
    • Hou, M., Xu, Q., Shanqing, G., & Jiang, H. (2010). Cryptanalysis of identity-based authenticated key agreement protocols from parings. Journal of Networks, 5(7), 826–855.
    • (2010) Journal of Networks , vol.5 , Issue.7 , pp. 826-855
    • Hou, M.1    Xu, Q.2    Shanqing, G.3    Jiang, H.4
  • 40
    • 84893698401 scopus 로고    scopus 로고
    • Robust smart card authentication scheme for multi-server architecture
    • Pippal, R. S., Jaidhar, C. D., & Tapaswi, S. (2013). Robust smart card authentication scheme for multi-server architecture. Wireless Personal Communications, 72, 729–745.
    • (2013) Wireless Personal Communications , vol.72 , pp. 729-745
    • Pippal, R.S.1    Jaidhar, C.D.2    Tapaswi, S.3
  • 41
    • 84880841622 scopus 로고    scopus 로고
    • A new password-based multi-server authentication scheme robust to password guessing attacks
    • Tsai, J.-L., Lo, N.-W., & Wu, T.-C. (2013). A new password-based multi-server authentication scheme robust to password guessing attacks. Wireless Personal Communications, 71, 1977–1988.
    • (2013) Wireless Personal Communications , vol.71 , pp. 1977-1988
    • Tsai, J.-L.1    Lo, N.-W.2    Wu, T.-C.3
  • 44
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • Pointcheval, D., & Stern, J. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13, 361–396.
    • (2000) Journal of Cryptology , vol.13 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.