Threshold Password-Based Authentication Using Bilinear Pairings
نویسندگان
چکیده
We present a new threshold password-based authentication protocol that allows a roaming user(a user who accesses a network from different client terminals) to download a private key from remote servers with knowledge of only his identity and password. He does not carry the smart card storing user’s private information. We note that as a goal of a multi-server roaming system, a protocol has to allow a user to get his private key from the servers, even if some of the servers are compromised. With this point of view, we give the first description of a threshold password-only roaming protocol. In this paper, we use (k,n)-threshold scheme in which only k honest servers or more are engaged to reconstruct a secret key. Our scheme is based on bilinear pairings which could be built from Weil pairing or Tate pairing.
منابع مشابه
Secure Remote User Authentication Scheme Using Bilinear Pairings
In 2006, Das et al. proposed a remote user authentication scheme using the properties of bilinear pairings. The current paper, however, demonstrates that Das et al.’s scheme is still vulnerable to an impersonation attack and an off-line password guessing attack. Furthermore, we present an improved authentication scheme based on bilinear computational Diffie-Hellman problem and one-way hash func...
متن کاملA Remote User Authentication Scheme using Bilinear Pairings
In 2006, Das et al. [6] proposed a novel remote user authentication scheme using bilinear pairings. In that scheme, the remote system receives user login request and allows login to the legitimate user. In this paper we present the cryptanalysis of the Das et al. scheme and propose an improved and more secure scheme that enables user to choose and change their password without the help of the r...
متن کاملThree Attacks on Jia et al.’s Remote User Authentication Scheme using Bilinear Pairings and ECC
Recently, Jia et al. proposed a remote user authentication scheme using bilinear pairings and an Elliptic Curve Cryptosystem (ECC). However, the scheme is vulnerable to privileged insider attack at their proposed registration phase and to forgery attack at their proposed authentication phase. In addition, the scheme can be vulnerable to server spoofing attack because it does not provide mutual ...
متن کاملNovel Remote User Authentication Scheme Using Bilinear Pairings
The paper presents a remote user authentication scheme using the properties of bilinear pairings. In the scheme, the remote system receives user login request and allows login to the remote system if the login request is valid. The scheme prohibits the scenario of many logged in users with the same login-ID, and provides a flexible password change option to the registered users without any assi...
متن کاملAn Improved Anonymous Password Authentication Scheme Using Nonce and Bilinear Pairings
In 2013, Li et al. pointed out the security problems of Chen’s password authentication scheme. they proposed an enhanced smart card based remote user password authentication scheme and claimed their scheme is secure against replay attacks, forgery attacks. In this paper, we state that the scheme is vulnerable to user impersonation attack. It also suffers from user anonymity violation and clock ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004