A New Remote Authentication Scheme for Anonymous Users Using Elliptic Curves Cryptosystem
نویسندگان
چکیده
Along with the large-scale proliferation of network and information technology, users can obtain the information resources conveniently via intelligent device. Authentication mechanism is a fundamental tool for ensuring secure communications and the validity of communicating party. In this paper, we propose a new authentication scheme for anonymous users using elliptic curves cryptosystem (ECC) which achieves mutual authentication and forward security. Specifically, we certify the validity of our proposal by employing BAN-logic, which is one of the important formal methods. Further, the performance comparison shows that our scheme is more suitable for application scenarios where efficiency and security concerned.
منابع مشابه
Source Anonymous Message Authentication Based On ECC in Wireless Sensor Networks
Source Anonymous Message authentication (SAMA) is one of the most effective ways to prevent unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs).A scalable authentication scheme based on elliptic curve cryptography (ECC) is introduced to allow any node to transmit an unlimited number of messages without suffering the threshold problem and provides message ...
متن کاملA Secure and Efficient Authentication with Key Agreement Scheme Based on Elliptic Curve Cryptosystem
Recently, Li et al. [20] proposed an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks to remedy the weaknesses of Rhee et al.’s scheme. Li et al.’s scheme not only achieves mutual authentication, but also provides the procedure for key agreement and updates of secrets for users and servers. However, we find that Li et al.’s scheme is ...
متن کاملThree Attacks on Jia et al.’s Remote User Authentication Scheme using Bilinear Pairings and ECC
Recently, Jia et al. proposed a remote user authentication scheme using bilinear pairings and an Elliptic Curve Cryptosystem (ECC). However, the scheme is vulnerable to privileged insider attack at their proposed registration phase and to forgery attack at their proposed authentication phase. In addition, the scheme can be vulnerable to server spoofing attack because it does not provide mutual ...
متن کاملPractical remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
Most recently, Yang et al proposed an ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem in journal of Computer and Security. In this paper, we find some disadvantages in their scheme and thereafter propose such an improved scheme that overcomes all those disadvantages existing in their scheme while the merits are left unchanged. Ou...
متن کاملA More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC
In 2012, Chuang et al. proposed a smart card based anonymous user authentication scheme for roaming service in global mobility networks. In this paper, however, we analyze Chuang et al.’s scheme and show that their scheme is in fact insecure to against server masquerading attack, off-line dictionary attack and user impersonation attack. Moreover, their scheme cannot achieve the claimed user ano...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 20 شماره
صفحات -
تاریخ انتشار 2018