메뉴 건너뛰기




Volumn 8, Issue 9, 2015, Pages 1732-1751

A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks

Author keywords

AVISPA; Distributed computer networks; ECC; Key establishment; Mutual authentication; Security; SSO; Uniqueness; User anonymity

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; DISTRIBUTED COMPUTER SYSTEMS; ELECTRIC BATTERIES; GEOMETRY; SMART CARDS;

EID: 84928801756     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.1139     Document Type: Article
Times cited : (27)

References (53)
  • 1
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • Ratha NK, Connell JH, Bolle RM. Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 2001; 40(3):614-634.
    • (2001) IBM Systems Journal , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 3
    • 84890034015 scopus 로고    scopus 로고
    • Security at risk as one third of surfers admit they use the same password for all websites
    • Accessed on January 2014
    • Security at risk as one third of surfers admit they use the same password for all websites, March 2009. Available at http://www.sophos.com/pressoffice/news/articles/2009/03/password-security.html. Accessed on January 2014.
    • (2009)
  • 4
    • 84928811214 scopus 로고    scopus 로고
    • Cryptanalysis of some user identification schemes for distributed computer networks
    • Chen YC, Liu CL, Horng G. Cryptanalysis of some user identification schemes for distributed computer networks. 2013).
    • (2013)
    • Chen, Y.C.1    Liu, C.L.2    Horng, G.3
  • 5
    • 84928817234 scopus 로고    scopus 로고
    • Security forum on single sign-on, TheOpenGroup
    • Online available at. Accessed on January 2014.
    • Security forum on single sign-on, TheOpenGroup. Online available at http://www.opengroup.org/security/l2-sso.htm. Accessed on January 2014.
  • 6
    • 84871821096 scopus 로고    scopus 로고
    • Security analysis of a single sign-on mechanism for distributed computer networks
    • Wang G, Yu J, Xie Q. Security analysis of a single sign-on mechanism for distributed computer networks. IEEE Transactions on Industrial Electronics 2013; 1:9.
    • (2013) IEEE Transactions on Industrial Electronics , vol.1 , pp. 9
    • Wang, G.1    Yu, J.2    Xie, Q.3
  • 7
    • 80053654561 scopus 로고    scopus 로고
    • A secure single sign-on mechanism for distributed computer networks
    • Chang C-C, Lee C-Y. A secure single sign-on mechanism for distributed computer networks. IEEE Transactions on Industrial Electronics 2012; 59(1):629-637.
    • (2012) IEEE Transactions on Industrial Electronics , vol.59 , Issue.1 , pp. 629-637
    • Chang, C.-C.1    Lee, C.-Y.2
  • 8
    • 84873031582 scopus 로고    scopus 로고
    • An efficient key-management scheme for hierarchical access control in E-medicine system
    • Wu S, Chen K. An efficient key-management scheme for hierarchical access control in E-medicine system. Journal of Medical Systems 2012; 36(4):2325-2337.
    • (2012) Journal of Medical Systems , vol.36 , Issue.4 , pp. 2325-2337
    • Wu, S.1    Chen, K.2
  • 9
    • 84897055589 scopus 로고    scopus 로고
    • A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
    • Odelu V, Das AK, Goswami A. A secure effective key management scheme for dynamic access control in a large leaf class hierarchy. Information Sciences 2014; 269(C):270-285.
    • (2014) Information Sciences , vol.269 , pp. 270-285
    • Odelu, V.1    Das, A.K.2    Goswami, A.3
  • 11
    • 75449106985 scopus 로고    scopus 로고
    • Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards
    • Li X, Qiu W, Zheng D, Chen K, Li J. Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Transactions on Industrial Electronics 2010; 57(2):793-800.
    • (2010) IEEE Transactions on Industrial Electronics , vol.57 , Issue.2 , pp. 793-800
    • Li, X.1    Qiu, W.2    Zheng, D.3    Chen, K.4    Li, J.5
  • 13
    • 84887815438 scopus 로고    scopus 로고
    • Cryptanalysis of a remote user authentication scheme for mobile clientserver environment based on ECC
    • Wang D, Ma CG. Cryptanalysis of a remote user authentication scheme for mobile clientserver environment based on ECC. Information Fusion 2013; 14(4):498-503.
    • (2013) Information Fusion , vol.14 , Issue.4 , pp. 498-503
    • Wang, D.1    Ma, C.G.2
  • 14
    • 0034225062 scopus 로고    scopus 로고
    • User identification and key distribution maintaining anonymity for distributed computer networks
    • Lee WB, Chang CC. User identification and key distribution maintaining anonymity for distributed computer networks. Computer Systems Science and Engineering 2000; 15(4):113-116.
    • (2000) Computer Systems Science and Engineering , vol.15 , Issue.4 , pp. 113-116
    • Lee, W.B.1    Chang, C.C.2
  • 15
    • 1542335490 scopus 로고    scopus 로고
    • Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks
    • Wu TS, Hsu CL. Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks. Computer Security 2004; 23(2):120-125.
    • (2004) Computer Security , vol.23 , Issue.2 , pp. 120-125
    • Wu, T.S.1    Hsu, C.L.2
  • 16
    • 10644225185 scopus 로고    scopus 로고
    • New efficient user identification and key distribution scheme providing enhanced security
    • Yang Y, Wang S, Bao F, Wang J, Deng RH. New efficient user identification and key distribution scheme providing enhanced security. Computer Security 2004; 23(8):697-704.
    • (2004) Computer Security , vol.23 , Issue.8 , pp. 697-704
    • Yang, Y.1    Wang, S.2    Bao, F.3    Wang, J.4    Deng, R.H.5
  • 17
    • 33645287503 scopus 로고    scopus 로고
    • Two attacks on the Wu-Hsu user identification scheme
    • Lee CC. Two attacks on the Wu-Hsu user identification scheme. International Journal of Network Security 2005; 1(3):147-148.
    • (2005) International Journal of Network Security , vol.1 , Issue.3 , pp. 147-148
    • Lee, C.C.1
  • 18
    • 33748125161 scopus 로고    scopus 로고
    • A secure identification and key agreement protocol with user anonymity (SIKA)
    • Mangipudi KV, Katti RS. A secure identification and key agreement protocol with user anonymity (SIKA). Computer Security 2006; 25(6):420-425.
    • (2006) Computer Security , vol.25 , Issue.6 , pp. 420-425
    • Mangipudi, K.V.1    Katti, R.S.2
  • 19
    • 56949092341 scopus 로고    scopus 로고
    • A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks
    • Hsu C-L, Chuang Y-H. A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks. Information Science 2009; 179(4):422-429.
    • (2009) Information Science , vol.179 , Issue.4 , pp. 422-429
    • Hsu, C.-L.1    Chuang, Y.-H.2
  • 20
    • 77952677593 scopus 로고    scopus 로고
    • Weaknesses and improvement of HsuChuang's user identification scheme
    • Tsai JL. Weaknesses and improvement of HsuChuang's user identification scheme. Information Technology and Control 2010; 39(1):48-50.
    • (2010) Information Technology and Control , vol.39 , Issue.1 , pp. 48-50
    • Tsai, J.L.1
  • 21
    • 84868090556 scopus 로고    scopus 로고
    • Provably secure single sign-on scheme in distributed systems and networks, Proceedings of the 2012 IEEE 11th International Conference on Trust
    • Liverpool, UK
    • Yu J, Wang G, Mu Y. Provably secure single sign-on scheme in distributed systems and networks, Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TRUSTCOM 2012), Liverpool, UK, 2012; 271-278.
    • (2012) Security and Privacy in Computing and Communications (TRUSTCOM 2012) , pp. 271-278
    • Yu, J.1    Wang, G.2    Mu, Y.3
  • 22
    • 79960556311 scopus 로고    scopus 로고
    • Generalized digital certificate for user authentication and key establishment for secure communications
    • Harn L, Ren J. Generalized digital certificate for user authentication and key establishment for secure communications. IEEE Transactions on Wireless Communications 2011; 10(7):2372-2379.
    • (2011) IEEE Transactions on Wireless Communications , vol.10 , Issue.7 , pp. 2372-2379
    • Harn, L.1    Ren, J.2
  • 23
    • 1842715081 scopus 로고    scopus 로고
    • The advantages of elliptic curve cryptography for wireless security
    • Lauter K. The advantages of elliptic curve cryptography for wireless security. IEEE Wireless Communications 2004; 11(1):62-67.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.1 , pp. 62-67
    • Lauter, K.1
  • 25
    • 0004533420 scopus 로고
    • A new approach to solving the cubic: Cardan's solution revealed
    • Nickalls RWD. A new approach to solving the cubic: Cardan's solution revealed. The Mathematical Gazette 1993; 77(480):354-359.
    • (1993) The Mathematical Gazette , vol.77 , Issue.480 , pp. 354-359
    • Nickalls, R.W.D.1
  • 27
    • 84862699099 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem
    • Das AK, Paul NR, Tripathy L. Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem. Information Sciences 2012; 209(C):80-92.
    • (2012) Information Sciences , vol.209 , pp. 80-92
    • Das, A.K.1    Paul, N.R.2    Tripathy, L.3
  • 28
    • 43749092801 scopus 로고    scopus 로고
    • Provably secure constant round contributory group key agreement
    • Dutta R, Barua R. Provably secure constant round contributory group key agreement. IEEE Transactions on Information Theory 2008; 54(5):2007-2025.
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.5 , pp. 2007-2025
    • Dutta, R.1    Barua, R.2
  • 29
    • 12344259813 scopus 로고    scopus 로고
    • BioHashing: two factor authentication featuring fingerprint data and tokenized random number
    • Jina ATB, Linga DNC, Goh A. BioHashing: two factor authentication featuring fingerprint data and tokenized random number. Pattern Recognition 2004; 37(11):2245-2255.
    • (2004) Pattern Recognition , vol.37 , Issue.11 , pp. 2245-2255
    • Jina, A.T.B.1    Linga, D.N.C.2    Goh, A.3
  • 30
    • 33750533142 scopus 로고    scopus 로고
    • An improved BioHashing for human authentication
    • Lumini A, Nanni L. An improved BioHashing for human authentication. Pattern Recognition 2007; 40(3):1057-1065.
    • (2007) Pattern Recognition , vol.40 , Issue.3 , pp. 1057-1065
    • Lumini, A.1    Nanni, L.2
  • 31
    • 78651389846 scopus 로고    scopus 로고
    • A simple and generic construction of authenticated encryption with associated data
    • Sarkar P. A simple and generic construction of authenticated encryption with associated data. ACM Transactions on Information and System Security 2010; 4:1-16.
    • (2010) ACM Transactions on Information and System Security , vol.4 , pp. 1-16
    • Sarkar, P.1
  • 32
    • 30744432873 scopus 로고    scopus 로고
    • Some observations on the theory of cryptographic hash functions
    • Stinson DR. Some observations on the theory of cryptographic hash functions. Designed Codes Cryptography 2006; 38(2):259-277.
    • (2006) Designed Codes Cryptography , vol.38 , Issue.2 , pp. 259-277
    • Stinson, D.R.1
  • 34
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • Messerges TS, Dabbish EA, Sloan RH. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51(5):541-552.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 36
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • ElGamal TA. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 1985; 31(4):469-472.
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • ElGamal, T.A.1
  • 37
    • 0028547435 scopus 로고
    • Design of generalized ElGamal type digital signature schemes based on discret logarithm
    • Harn L, Xu Y. Design of generalized ElGamal type digital signature schemes based on discret logarithm. Electronics Letters 1994; 30(24):2025-2026.
    • (1994) Electronics Letters , vol.30 , Issue.24 , pp. 2025-2026
    • Harn, L.1    Xu, Y.2
  • 38
    • 84928813166 scopus 로고    scopus 로고
    • Perceptual hashing. Available at. Accessed on November
    • Perceptual hashing. Available at http://www.amsqr.com/2013/01/perceptual-hashing.html. Accessed on November 2013.
    • (2013)
  • 40
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: how to generate strong keys from biometrics and other noisy data
    • LNCS 3027, Interlaken, Switzerland
    • Dodis Y, Reyzin L, Smith A. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. Proceedings of the Advances in Cryptology (Eurocrypt'04), LNCS 3027, Interlaken, Switzerland, 2004; 523-540.
    • (2004) Proceedings of the Advances in Cryptology (Eurocrypt'04) , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 41
    • 0003508558 scopus 로고    scopus 로고
    • Advanced Encryption Standard. FIPS PUB 197
    • National Institute of Standards and Technology (NIST), U.S. Department of Commerce, November. Accessed on November 2010.
    • Advanced Encryption Standard. FIPS PUB 197. National Institute of Standards and Technology (NIST), U.S. Department of Commerce, November 2001. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf. Accessed on November 2010.
    • (2001)
  • 42
    • 78649335192 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
    • Li X, Niu J-W, Ma J, Wang W-D, Liu C-L. Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications 2011; 34(1):73-79.
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.1 , pp. 73-79
    • Li, X.1    Niu, J.-W.2    Ma, J.3    Wang, W.-D.4    Liu, C.-L.5
  • 43
    • 84883262804 scopus 로고    scopus 로고
    • An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system
    • Das AK, Bruhadeshwar B. An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system. Journal of Medical Systems 2013; 37(5):1-17.
    • (2013) Journal of Medical Systems , vol.37 , Issue.5 , pp. 1-17
    • Das, A.K.1    Bruhadeshwar, B.2
  • 44
    • 45849132580 scopus 로고    scopus 로고
    • Automated validation of Internet security protocols and applications
    • Available at. Accessed on January 2014.
    • Automated validation of Internet security protocols and applications. Available at http://www.avispa-project.org/. Accessed on January 2014.
  • 46
    • 84891619186 scopus 로고    scopus 로고
    • Formal security verification of a dynamic password-based user authentication scheme for hierarchical wireless sensor networks
    • Communications in Computer and Information Science Series (CCIS), Springer-Verlag, Berlin-Heidelberg
    • Das AK, Chatterjee S, Formal security verification of a dynamic password-based user authentication scheme for hierarchical wireless sensor networks, Proceedings of International Symposium on Security in Computing and Communications (SSCC 2013), Communications in Computer and Information Science Series (CCIS), Springer-Verlag, Berlin-Heidelberg; 243-254.
    • Proceedings of International Symposium on Security in Computing and Communications (SSCC 2013) , pp. 243-254
    • Das, A.K.1    Chatterjee, S.2
  • 47
    • 84894255457 scopus 로고    scopus 로고
    • An enhanced access control scheme in wireless sensor networks
    • Chatterjee S, Das AK, Sing JK. An enhanced access control scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks 2014; 21(1-2):121-149.
    • (2014) Ad Hoc & Sensor Wireless Networks , vol.21 , Issue.1-2 , pp. 121-149
    • Chatterjee, S.1    Das, A.K.2    Sing, J.K.3
  • 48
    • 26444497860 scopus 로고    scopus 로고
    • The AVISPA tool for the automated validation of internet security protocols and applications
    • LNCS, Springer-Verlag, Berlin-Heidelberg
    • Armando A et al. The AVISPA tool for the automated validation of internet security protocols and applications, Proceedings of 17th International Conference on Computer Aided Verification (CAV'05), LNCS, Springer-Verlag, Berlin-Heidelberg, 2005; 281-285.
    • (2005) Proceedings of 17th International Conference on Computer Aided Verification (CAV'05) , pp. 281-285
    • Armando, A.1
  • 49
    • 70349371604 scopus 로고    scopus 로고
    • The high-level protocol specification language HLPSL developed in the EU project AVISPA
    • von Oheimb D. The high-level protocol specification language HLPSL developed in the EU project AVISPA, Proceedings of APPSEM Workshop, Tallinn, 2005.
    • (2005) Proceedings of APPSEM Workshop, Tallinn
    • von Oheimb, D.1
  • 51
    • 84928787764 scopus 로고    scopus 로고
    • AVISPA Web tool. Available at. Accessed on January 2014
    • AVISPA Web tool. Available at http://www.avispa-project.org/web-interface/expert.php/. Accessed on January 2014.
  • 52
    • 84928800367 scopus 로고    scopus 로고
    • Secure hash standard, NIST Standard FIPS PUB 180-3
    • Secure hash standard, NIST Standard FIPS PUB 180-3, 2008.
    • (2008)
  • 53
    • 53049100441 scopus 로고    scopus 로고
    • Practical anonymous user authentication scheme with security proof
    • Chien HY. Practical anonymous user authentication scheme with security proof. Computer Security 2008; 27(5-6):216-223.
    • (2008) Computer Security , vol.27 , Issue.5-6 , pp. 216-223
    • Chien, H.Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.