메뉴 건너뛰기




Volumn 84, Issue 1, 2015, Pages 439-462

Design and Analysis of Bilinear Pairing Based Mutual Authentication and Key Agreement Protocol Usable in Multi-server Environment

Author keywords

Bilinear pairing; Biometric template; Security attacks; Three factor; User anonymity; User authentication

Indexed keywords

BIOMETRICS; INTERNET PROTOCOLS; MOBILE SECURITY; NETWORK ARCHITECTURE; NETWORK SECURITY; PUBLIC KEY CRYPTOGRAPHY; SMART CARDS; TRANSPORTATION;

EID: 84938999815     PISSN: 09296212     EISSN: 1572834X     Source Type: Journal    
DOI: 10.1007/s11277-015-2616-7     Document Type: Article
Times cited : (82)

References (46)
  • 1
    • 84923316212 scopus 로고    scopus 로고
    • Cryptanalysis and an efficient secure ID-based remote user authentication using smart card
    • Amin, R. (2013). Cryptanalysis and an efficient secure ID-based remote user authentication using smart card. International Journal of Computer Applications, 75(13), 43–48.
    • (2013) International Journal of Computer Applications , vol.75 , Issue.13 , pp. 43-48
    • Amin, R.1
  • 2
    • 84923296566 scopus 로고    scopus 로고
    • A novel user authentication and key agreement protocol for accessing multi-medical server usable in TMIS
    • Amin, R., & Biswas, G. P. (2015). A novel user authentication and key agreement protocol for accessing multi-medical server usable in TMIS. Journal of Medical Systems, 39(3), 33. doi:10.1007/s10916-015-0217-3.
    • (2015) Journal of Medical Systems , vol.39 , Issue.3 , pp. 33
    • Amin, R.1    Biswas, G.P.2
  • 3
    • 84922032139 scopus 로고    scopus 로고
    • Amin, R., & Biswas, G. P. (2015). Remote access control mechanism using rabin public key cryptosystem. In Information systems design and intelligent applications, advances in intelligent systems and computing (vol. 339, pp. 525–533). Springer.
    • Amin, R., & Biswas, G. P. (2015). Remote access control mechanism using rabin public key cryptosystem. In Information systems design and intelligent applications, advances in intelligent systems and computing (vol. 339, pp. 525–533). Springer. doi:10.1007/978-81-322-2250-7_52.
  • 4
    • 84908624175 scopus 로고    scopus 로고
    • An improved efficient remote user authentication scheme in multi-server environment using smart card
    • Amin, R., Maitra, T., & Giri, D. (2013). An improved efficient remote user authentication scheme in multi-server environment using smart card. International Journal of Computer Applications, 69(22), 1–6.
    • (2013) International Journal of Computer Applications , vol.69 , Issue.22 , pp. 1-6
    • Amin, R.1    Maitra, T.2    Giri, D.3
  • 5
    • 4043089982 scopus 로고    scopus 로고
    • An enhanced remote user authentication scheme using smart cards
    • Awasthi, A. K., & Lal, S. (2004). An enhanced remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 50(2), 583–586.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.2 , pp. 583-586
    • Awasthi, A.K.1    Lal, S.2
  • 7
    • 84874324906 scopus 로고    scopus 로고
    • Boneh, D., & Franklin, M. (2001). Identity-based encryption from the weil pairing. In Advances in cryptology CRYPTO 2001, lecture notes in computer science (vol. 2139, pp. 213–229). Springer, Berlin.
    • Boneh, D., & Franklin, M. (2001). Identity-based encryption from the weil pairing. In Advances in cryptology CRYPTO 2001, lecture notes in computer science (vol. 2139, pp. 213–229). Springer, Berlin. doi:10.1007/3-540-44647-8_13.
  • 8
    • 84938985075 scopus 로고    scopus 로고
    • Boyd, C., & Mathuria, A. (2003). In Protocols for authentication and key establishment.
    • Boyd, C., & Mathuria, A. (2003). In Protocols for authentication and key establishment. doi:10.1007/978-3-662-09527-0.
  • 11
    • 84872112386 scopus 로고    scopus 로고
    • A uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
    • Chang, Y. F., Yu, S. H., & Shiao, D. R. (2013). A uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Journal of Medical Systems, 37(2), 1–9. doi:10.1007/s10916-012-9902-7.
    • (2013) Journal of Medical Systems , vol.37 , Issue.2 , pp. 1-16
    • Chang, Y.F.1    Yu, S.H.2    Shiao, D.R.3
  • 12
    • 84864775732 scopus 로고    scopus 로고
    • An improved secure dynamic ID based remote user authentication scheme for multi-server environment
    • Lee, C.-C., Lai, Y.-M., & Li, C. T. (2011). An improved secure dynamic ID based remote user authentication scheme for multi-server environment. Expert Systems with Applications, 38(11), 203–209.
    • (2011) Expert Systems with Applications , vol.38 , Issue.11 , pp. 203-209
    • Lee, C.-C.1    Lai, Y.-M.2    Li, C.T.3
  • 13
    • 84938993004 scopus 로고    scopus 로고
    • Cheon, J. H., & Lee, D. H. (2002). Diffie-hellman problems and bilinear maps. Cryptology ePrint Archive: Report 2002.
    • Cheon, J. H., & Lee, D. H. (2002). Diffie-hellman problems and bilinear maps. Cryptology ePrint Archive: Report 2002.
  • 14
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication: Smart card
    • Chien, H. Y., Jan, J. K., & Tseng, Y. M. (2002). An efficient and practical solution to remote authentication: Smart card. Computers and Security, 21(4), 372–375. doi:10.1016/S0167-4048(02)00415-7.
    • (2002) Computers and Security , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.Y.1    Jan, J.K.2    Tseng, Y.M.3
  • 15
    • 51849131973 scopus 로고    scopus 로고
    • Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., & Shalmani, M. (2008). On the power of power analysis in the real world: A complete break of the keeloq code hopping scheme. In Advances in cryptology CRYPTO 2008, lecture notes in computer science (vol. 5157, pp. 203–220). Springer, Berlin.
    • Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., & Shalmani, M. (2008). On the power of power analysis in the real world: A complete break of the keeloq code hopping scheme. In Advances in cryptology CRYPTO 2008, lecture notes in computer science (vol. 5157, pp. 203–220). Springer, Berlin. doi:10.1007/978-3-540-85174-5_12.
  • 16
    • 84968502759 scopus 로고
    • A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
    • Frey, G., & Rück, H. G. (1994). A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves. Mathematics of computation, 62(206), 865–874. doi:10.2307/2153546.
    • (1994) Mathematics of computation , vol.62 , Issue.206 , pp. 865-874
    • Frey, G.1    Rück, H.G.2
  • 17
    • 56449110391 scopus 로고    scopus 로고
    • A dynamic ID-based user authentication and key agreement scheme for multi-server environment using bilinear pairings. In Power electronics and intelligent transportation system, 2008. PEITS ’08
    • Geng, J., & Zhang, L. (2008). A dynamic ID-based user authentication and key agreement scheme for multi-server environment using bilinear pairings. In Power electronics and intelligent transportation system, 2008. PEITS ’08. Workshop on (pp. 33–37). doi:10.1109/PEITS.2008.35.
    • (2008) Workshop on , pp. 33-37
    • Geng, J.1    Zhang, L.2
  • 18
    • 68849128250 scopus 로고    scopus 로고
    • Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
    • Hsiang, H. C., & Shih, W. K. (2009). Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards and Interfaces, 31(6), 1118–1123. doi:10.1016/j.csi.2008.11.002.
    • (2009) Computer Standards and Interfaces , vol.31 , Issue.6 , pp. 1118-1123
    • Hsiang, H.C.1    Shih, W.K.2
  • 19
    • 84907590232 scopus 로고    scopus 로고
    • An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures
    • Hsieh, W. B., & Leu, J. S. (2014). An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures. The Journal of Supercomputing, 70(1), 133–148. doi:10.1007/s11227-014-1135-8.
    • (2014) The Journal of Supercomputing , vol.70 , Issue.1 , pp. 133-148
    • Hsieh, W.B.1    Leu, J.S.2
  • 20
    • 84920258664 scopus 로고    scopus 로고
    • A provably secure ID-based mutual authentication and key agreement scheme for mobile multi-server environment without esl attack
    • Islam, S. (2014). A provably secure ID-based mutual authentication and key agreement scheme for mobile multi-server environment without esl attack. Wireless Personal Communications, 79(3), 1975–1991. doi:10.1007/s11277-014-1968-8.
    • (2014) Wireless Personal Communications , vol.79 , Issue.3 , pp. 1975-1991
    • Islam, S.1
  • 21
    • 12344259813 scopus 로고    scopus 로고
    • Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
    • Jin, A. T. B., Ling, D. N. C., & Goh, A. (2004). Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition, 37(11), 2245–2255.
    • (2004) Pattern Recognition , vol.37 , Issue.11 , pp. 2245-2255
    • Jin, A.T.B.1    Ling, D.N.C.2    Goh, A.3
  • 22
    • 1942455353 scopus 로고    scopus 로고
    • Efficient multi-server password authenticated key agreement using smart cards
    • Juang, W. S. (2004). Efficient multi-server password authenticated key agreement using smart cards. IEEE Transactions on Consumer Electronics, 50(1), 251–255. doi:10.1109/TCE.2004.1277870.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.1 , pp. 251-255
    • Juang, W.S.1
  • 24
    • 0034225062 scopus 로고    scopus 로고
    • User identification and key distribution maintaining anonymity for distributed computer network
    • Lee, W. B., & Chang, C. C. (2000). User identification and key distribution maintaining anonymity for distributed computer network. Computer and System Science, 15(4), 211–214.
    • (2000) Computer and System Science , vol.15 , Issue.4 , pp. 211-214
    • Lee, W.B.1    Chang, C.C.2
  • 25
    • 79959970986 scopus 로고    scopus 로고
    • A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards
    • Lee, C. C., Lin, T. H., & Chang, R. X. (2011). A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards. Expert Systems with Applications, 38(11), 13,863–13,870. doi:10.1016/j.eswa.2011.04.190.
    • (2011) Expert Systems with Applications , vol.38 , Issue.11 , pp. 863-870
    • Lee, C.C.1    Lin, T.H.2    Chang, R.X.3
  • 26
    • 84878597719 scopus 로고    scopus 로고
    • A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Mathematical and Computer Modelling 58(1–2), 85–95 (2013). doi:10.1016/j.mcm.2012.06.033
    • Li, X., Ma, J., Wang, W., Xiong, Y., & Zhang, J. (2010). A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Mathematical and Computer Modelling 58(1–2), 85–95 (2013). doi:10.1016/j.mcm.2012.06.033. Financial IT and security and international symposium on computational electronics.
    • (2010) Financial IT and security and international symposium on computational electronics
    • Li, X.1    Ma, J.2    Wang, W.3    Xiong, Y.4    Zhang, J.5
  • 27
    • 84938960924 scopus 로고    scopus 로고
    • An enhancement of a smart card authentication scheme for multi-server architecture
    • Li, X., Niu, J., Kumari, S., Liao, J., & Liang, W. (2015). An enhancement of a smart card authentication scheme for multi-server architecture. Wireless Personal Communications, 80(1), 175–192. doi:10.1007/s11277-014-2002-x.
    • (2015) Wireless Personal Communications , vol.80 , Issue.1 , pp. 175-192
    • Li, X.1    Niu, J.2    Kumari, S.3    Liao, J.4    Liang, W.5
  • 28
    • 75449106985 scopus 로고    scopus 로고
    • Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards
    • Li, X., Qiu, W., Zheng, D., Chen, K., & Li, J. (2010). Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Transactions on Industrial Electronics, 57(2), 793–800. doi:10.1109/TIE.2009.2028351.
    • (2010) IEEE Transactions on Industrial Electronics , vol.57 , Issue.2 , pp. 793-800
    • Li, X.1    Qiu, W.2    Zheng, D.3    Chen, K.4    Li, J.5
  • 29
    • 84856217617 scopus 로고    scopus 로고
    • An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards
    • Li, X., Xiong, Y., Ma, J., & Wang, W. (2012). An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. Journal of Network and Computer Applications, 35(2), 763–769. doi:10.1016/j.jnca.2011.11.009.
    • (2012) Journal of Network and Computer Applications , vol.35 , Issue.2 , pp. 763-769
    • Li, X.1    Xiong, Y.2    Ma, J.3    Wang, W.4
  • 30
    • 84870314409 scopus 로고    scopus 로고
    • A novel multi-server remote user authentication scheme using self-certified public keys for mobile clients
    • Liao, Y. P., & Hsiao, C. M. (2013). A novel multi-server remote user authentication scheme using self-certified public keys for mobile clients. Future Generation Computer Systems, 29(3), 886–900.
    • (2013) Future Generation Computer Systems , vol.29 , Issue.3 , pp. 886-900
    • Liao, Y.P.1    Hsiao, C.M.2
  • 31
    • 54449094667 scopus 로고    scopus 로고
    • A secure dynamic ID based remote user authentication scheme for multi-server environment
    • Liao, Y. P., & Wang, S. S. (2009). A secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards and Interfaces, 31(1), 24–29. doi:10.1016/j.csi.2007.10.007.
    • (2009) Computer Standards and Interfaces , vol.31 , Issue.1 , pp. 24-29
    • Liao, Y.P.1    Wang, S.S.2
  • 32
    • 0037211327 scopus 로고    scopus 로고
    • A new remote user authentication scheme for multi-server architecture
    • Lin, I. C., Hwang, M. S., & Li, L. H. (2003). A new remote user authentication scheme for multi-server architecture. Future Generation Computer Systems, 19(1), 13–22. doi:10.1016/S0167-739X(02)00093-6.
    • (2003) Future Generation Computer Systems , vol.19 , Issue.1 , pp. 13-22
    • Lin, I.C.1    Hwang, M.S.2    Li, L.H.3
  • 33
    • 33750533142 scopus 로고    scopus 로고
    • An improved biohashing for human authentication
    • Lumini, A., & Nanni, L. (2007). An improved biohashing for human authentication. Pattern Recognition, 40(3), 1057–1065. doi:10.1016/j.patcog.2006.05.030.
    • (2007) Pattern Recognition , vol.40 , Issue.3 , pp. 1057-1065
    • Lumini, A.1    Nanni, L.2
  • 34
    • 85030330304 scopus 로고
    • Reducing elliptic curve logarithms to logarithms in a finite field. In Proceedings of the twenty-third annual ACM symposium on theory of computing
    • Menezes, A., Vanstone, S., & Okamoto, T. (1991). Reducing elliptic curve logarithms to logarithms in a finite field. In Proceedings of the twenty-third annual ACM symposium on theory of computing, STOC ’91 (pp. 80–89). doi:10.1145/103418.103434.
    • (1991) STOC ’91 , pp. 80-89
    • Menezes, A.1    Vanstone, S.2    Okamoto, T.3
  • 35
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • Messerges, T. S., Dabbish, E. A., & Sloan, R. H. (2002). Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541–552.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 36
    • 84893698401 scopus 로고    scopus 로고
    • Robust smart card authentication scheme for multi-server architecture
    • Pippal, R., Jaidhar, C., & Tapaswi, S. (2013). Robust smart card authentication scheme for multi-server architecture. Wireless Personal Communications, 72(1), 729–745. doi:10.1007/s11277-013-1039-6.
    • (2013) Wireless Personal Communications , vol.72 , Issue.1 , pp. 729-745
    • Pippal, R.1    Jaidhar, C.2    Tapaswi, S.3
  • 37
    • 78650397518 scopus 로고    scopus 로고
    • Shao, M.H., & Chin, Y.C. (2010). A novel approach to dynamic ID-based remote user authentication scheme for multi-server environment. In Proceedings of the 2010 fourth international conference on network and system security, NSS ’10 (pp. 548–553). IEEE Computer Society, Washington, DC, USA.
    • Shao, M.H., & Chin, Y.C. (2010). A novel approach to dynamic ID-based remote user authentication scheme for multi-server environment. In Proceedings of the 2010 fourth international conference on network and system security, NSS ’10 (pp. 548–553). IEEE Computer Society, Washington, DC, USA. doi:10.1109/NSS.2010.95.
  • 38
    • 79251600218 scopus 로고    scopus 로고
    • Sood, S. K., Sarje, A. K., & Singh, K. (2011). A secure dynamic identity based authentication protocol for multi-server architecture. Journal of Network and Computer Applications, 34(2), 609–618. Efficient and Robust Security and Services of Wireless Mesh Networks.
    • Sood, S. K., Sarje, A. K., & Singh, K. (2011). A secure dynamic identity based authentication protocol for multi-server architecture. Journal of Network and Computer Applications, 34(2), 609–618. doi:10.1016/j.jnca.2010.11.011. Efficient and Robust Security and Services of Wireless Mesh Networks.
  • 40
    • 47949104161 scopus 로고    scopus 로고
    • A pairing-based user authentication scheme for wireless clients with smart card
    • Tseng, Y. M., Wu, T. Y., & Wu, J. (2008). A pairing-based user authentication scheme for wireless clients with smart card. Informatics, 19(2), 285–302.
    • (2008) Informatics , vol.19 , Issue.2 , pp. 285-302
    • Tseng, Y.M.1    Wu, T.Y.2    Wu, J.3
  • 41
    • 26844506188 scopus 로고    scopus 로고
    • Tsuar, W. J., Chang, C. C., & Wu, W. L. (2001). A flexible user authentication scheme for multi-server internet services. In Networking ICN 2001, lecture notes in computer science (vol. 2093, pp. 174–183). Springer, Berlin.
    • Tsuar, W. J., Chang, C. C., & Wu, W. L. (2001). A flexible user authentication scheme for multi-server internet services. In Networking ICN 2001, lecture notes in computer science (vol. 2093, pp. 174–183). Springer, Berlin. doi:10.1007/3-540-47728-4_18.
  • 42
    • 84901188390 scopus 로고    scopus 로고
    • A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion
    • Turkanovic, M., Brumen, B., & Hölbl, M. (2014). A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Networks, 20, 96–112. doi:10.1016/j.adhoc.2014.03.009.
    • (2014) Ad Hoc Networks , vol.20 , pp. 96-112
    • Turkanovic, M.1    Brumen, B.2    Hölbl, M.3
  • 43
    • 84872324933 scopus 로고    scopus 로고
    • A smart card based efficient and secured multi-server authentication scheme
    • Wang, B., & Ma, M. (2013). A smart card based efficient and secured multi-server authentication scheme. Wireless Personal Communications, 68(2), 361–378. doi:10.1007/s11277-011-0456-7.
    • (2013) Wireless Personal Communications , vol.68 , Issue.2 , pp. 361-378
    • Wang, B.1    Ma, M.2
  • 44
    • 84903695746 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a robust smart card authentication scheme for multi-server architecture
    • Wei, J., Liu, W., & Hu, X. (2014). Cryptanalysis and improvement of a robust smart card authentication scheme for multi-server architecture. Wireless Personal Communications, 77(3), 2255–2269. doi:10.1007/s11277-014-1636-z.
    • (2014) Wireless Personal Communications , vol.77 , Issue.3 , pp. 2255-2269
    • Wei, J.1    Liu, W.2    Hu, X.3
  • 45
    • 64249125305 scopus 로고    scopus 로고
    • An improved smart card based password authentication scheme with provable security
    • Xu, J., Zhu, W. T., & Feng, D. G. (2009). An improved smart card based password authentication scheme with provable security. Computer Standards and Interfaces, 31(4), 723–728. doi:10.1016/j.csi.2008.09.006.
    • (2009) Computer Standards and Interfaces , vol.31 , Issue.4 , pp. 723-728
    • Xu, J.1    Zhu, W.T.2    Feng, D.G.3
  • 46
    • 85018131068 scopus 로고    scopus 로고
    • An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment
    • Zhao, D., Peng, H., Li, S., & Yang, Y. (2013) An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment. CoRR abs/1305.6350. http://arxiv.org/abs/1305.6350
    • (2013) CoRR abs/1305 , pp. 6350
    • Zhao, D.1    Peng, H.2    Li, S.3    Yang, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.