A New Remote Authentication Scheme for Anonymous Users Using Elliptic Curves Cryptosystem

نویسندگان

  • Xueqin Zhang
  • Baoping Wang
  • Wei Wang
چکیده

Along with the large-scale proliferation of network and information technology, users can obtain the information resources conveniently via intelligent device. Authentication mechanism is a fundamental tool for ensuring secure communications and the validity of communicating party. In this paper, we propose a new authentication scheme for anonymous users using elliptic curves cryptosystem (ECC) which achieves mutual authentication and forward security. Specifically, we certify the validity of our proposal by employing BAN-logic, which is one of the important formal methods. Further, the performance comparison shows that our scheme is more suitable for application scenarios where efficiency and security concerned.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Source Anonymous Message Authentication Based On ECC in Wireless Sensor Networks

Source Anonymous Message authentication (SAMA) is one of the most effective ways to prevent unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs).A scalable authentication scheme based on elliptic curve cryptography (ECC) is introduced to allow any node to transmit an unlimited number of messages without suffering the threshold problem and provides message ...

متن کامل

A Secure and Efficient Authentication with Key Agreement Scheme Based on Elliptic Curve Cryptosystem

Recently, Li et al. [20] proposed an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks to remedy the weaknesses of Rhee et al.’s scheme. Li et al.’s scheme not only achieves mutual authentication, but also provides the procedure for key agreement and updates of secrets for users and servers. However, we find that Li et al.’s scheme is ...

متن کامل

Three Attacks on Jia et al.’s Remote User Authentication Scheme using Bilinear Pairings and ECC

Recently, Jia et al. proposed a remote user authentication scheme using bilinear pairings and an Elliptic Curve Cryptosystem (ECC). However, the scheme is vulnerable to privileged insider attack at their proposed registration phase and to forgery attack at their proposed authentication phase. In addition, the scheme can be vulnerable to server spoofing attack because it does not provide mutual ...

متن کامل

Practical remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem

Most recently, Yang et al proposed an ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem in journal of Computer and Security. In this paper, we find some disadvantages in their scheme and thereafter propose such an improved scheme that overcomes all those disadvantages existing in their scheme while the merits are left unchanged. Ou...

متن کامل

A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC

In 2012, Chuang et al. proposed a smart card based anonymous user authentication scheme for roaming service in global mobility networks. In this paper, however, we analyze Chuang et al.’s scheme and show that their scheme is in fact insecure to against server masquerading attack, off-line dictionary attack and user impersonation attack. Moreover, their scheme cannot achieve the claimed user ano...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 20  شماره 

صفحات  -

تاریخ انتشار 2018