A pairing-based password authentication scheme using smart card with user anonymity

被引:0
作者
Jiang, Linmei [1 ]
Dai, Songsong [1 ]
Liu, Niansheng [2 ]
Guo, Donghui [1 ]
机构
[1] Xiamen Univ, Sch Informat Sci & Engn, Xiamen 361005, Fujian, Peoples R China
[2] Jimei Univ, Sch Comp Engn, Xiamen 361021, Fujian, Peoples R China
关键词
authentication; user anonymity; key agreement; smart card; pairing; elliptic curve; network security; elliptic curve discrete logarithm problem; ECDLP;
D O I
10.1504/IJIPT.2015.074314
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Password authentication is one of the most convenient and frequently used mechanisms to provide secure remote access control. In this paper, a pairing-based password authentication scheme which draws on the experience of two previous researches is proposed, and the detailed authentication phases which utilise the good properties of bilinear pairing are illustrated. Meanwhile, strict cryptanalysis is made to clarify the good security and functionality features of the proposed scheme in defending various attacks. Besides that, some flaws of a previous scheme are analysed and theoretical comparison of the computation cost with that scheme is made. Furthermore, experiments are conducted properly and the results are shown to explain the high efficiency of the proposed scheme.
引用
收藏
页码:12 / 22
页数:11
相关论文
共 24 条
  • [1] Barker E., 2007, RECOMMENDATION KEY 1
  • [2] Refinements of Miller's algorithm for computing the Weil/Tate pairing
    Blake, IF
    Murty, VK
    Xu, GW
    [J]. JOURNAL OF ALGORITHMS-COGNITION INFORMATICS AND LOGIC, 2006, 58 (02): : 134 - 149
  • [3] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [4] Identity-based key agreement protocols from pairings
    Chen, L.
    Cheng, Z.
    Smart, N. P.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (04) : 213 - 241
  • [5] Evans D.L., 2001, FIPS PUB
  • [6] Gura N, 2004, LECT NOTES COMPUT SC, V3156, P119
  • [7] Hankerson D., 2006, GUIDE ELLIPTIC CURVE
  • [8] Hongfeng Zhu, 2010, Proceedings of the 2010 International Conference on Computational Aspects of Social Networks (CASoN 2010), P74, DOI 10.1109/CASoN.2010.24
  • [9] Hughes D., 2004, Journal of Computer Security, V12, P3
  • [10] Design of improved password authentication and update scheme based on elliptic curve cryptography
    Islam, S. K. Hafizul
    Biswas, G. P.
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (11-12) : 2703 - 2717