Authentication protocol based on elliptic curve cryptography

被引:0
|
作者
Constantinescu, Nicolae [1 ]
机构
[1] Univ Craiova, Fac Math & Comp Sci, Al I Cuza St 13, RO-200585 Craiova, Romania
来源
ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES | 2010年 / 37卷 / 02期
关键词
elliptic curve; cryptosystem; authentication protocol;
D O I
暂无
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The authentication protocols based on classic cryptography use public-key cryptosystems for establishing the common key. Some of them have been proven to be secure but they require high amount of resources and they need large keys. Applying an elliptic curve authentication protocol the memory and the power consumption are lower. Another advantage is that this kind of protocols are secure enough even if a small key is used. In this paper we present an authentication protocol based on elliptic curve cryptography and zero knowledge. The protocol is developed for group communication. Every member of the group has a secret information and the communication starts when all this information is put together. So, if one member is not online, the others cannot communicate. We, also, present some situations where this kind of protocol is needed.
引用
收藏
页码:83 / 91
页数:9
相关论文
共 50 条
  • [1] An Efficient Authentication Protocol Based on Elliptic Curve Cryptography for Mobile Networks
    Rajeswari, P. G.
    Thilagavathi, K.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (02): : 176 - 185
  • [2] Secure Mutual Authentication Protocol for RFID Based on Elliptic Curve Cryptography
    Alamr, Amjad Ali
    Kausar, Firdous
    Kim, Jong Sung
    2016 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2016,
  • [3] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Dinarvand, Negin
    Barati, Hamid
    WIRELESS NETWORKS, 2019, 25 (01) : 415 - 428
  • [4] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Negin Dinarvand
    Hamid Barati
    Wireless Networks, 2019, 25 : 415 - 428
  • [5] Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography
    Zhang, Liping
    Tang, Shanyu
    Chen, Jing
    Zhu, Shaohui
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 81 (01) : 53 - 75
  • [6] Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography
    Liping Zhang
    Shanyu Tang
    Jing Chen
    Shaohui Zhu
    Wireless Personal Communications, 2015, 81 : 53 - 75
  • [7] An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography
    Wu, Kan
    Gong, Peng
    Wang, Jiantao
    Yan, Xiaopeng
    Li, Ping
    ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY, 2013, 16 (04): : 324 - 335
  • [8] An Elliptic Curve Based Handoff Authentication Protocol for WLAN
    Wan Changsheng
    Hu Aiqun
    Zhang Juan
    CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (01): : 165 - 169
  • [9] Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server based on Elliptic Curve Cryptography with the ElGamal's Algorithm
    Chalkias, Konstantinos
    Filiadis, George
    Stephanides, George
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 7, 2005, 7 : 137 - 142
  • [10] Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography
    Farash, Mohammad Sabzinejad
    JOURNAL OF SUPERCOMPUTING, 2014, 70 (02): : 987 - 1001