Authentication protocol based on elliptic curve cryptography

被引:0
|
作者
Constantinescu, Nicolae [1 ]
机构
[1] Univ Craiova, Fac Math & Comp Sci, Al I Cuza St 13, RO-200585 Craiova, Romania
关键词
elliptic curve; cryptosystem; authentication protocol;
D O I
暂无
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The authentication protocols based on classic cryptography use public-key cryptosystems for establishing the common key. Some of them have been proven to be secure but they require high amount of resources and they need large keys. Applying an elliptic curve authentication protocol the memory and the power consumption are lower. Another advantage is that this kind of protocols are secure enough even if a small key is used. In this paper we present an authentication protocol based on elliptic curve cryptography and zero knowledge. The protocol is developed for group communication. Every member of the group has a secret information and the communication starts when all this information is put together. So, if one member is not online, the others cannot communicate. We, also, present some situations where this kind of protocol is needed.
引用
收藏
页码:83 / 91
页数:9
相关论文
共 50 条
  • [1] Elliptic curve cryptography based wireless authentication protocol
    Yongliang, Liu
    Gao, Wen
    Yao, Hongxun
    Yu, Xinghua
    International Journal of Network Security, 2007, 5 (03) : 327 - 337
  • [2] Deniable authentication protocol based on elliptic curve cryptography
    Hwang, MS
    Sung, PC
    Tzeng, SF
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 65 - 67
  • [3] A Lightweight RFID Authentication Protocol based on Elliptic Curve Cryptography
    Liu, Ya-Li
    Qin, Xiao-Lin
    Wang, Chao
    Li, Bo-Han
    JOURNAL OF COMPUTERS, 2013, 8 (11) : 2880 - 2887
  • [4] A Roaming Authentication Protocol based on Elliptic Curve Cryptography in IOV
    Shen Cen
    Mu Haibing
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 400 - 404
  • [5] A Novel Authentication Management RFID Protocol Based on Elliptic Curve Cryptography
    Guoliang Liu
    Huichuan Zhang
    Fanyue Kong
    Lei Zhang
    Wireless Personal Communications, 2018, 101 : 1445 - 1455
  • [6] A Novel Authentication Management RFID Protocol Based on Elliptic Curve Cryptography
    Liu, Guoliang
    Zhang, Huichuan
    Kong, Fanyue
    Zhang, Lei
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 101 (03) : 1445 - 1455
  • [7] An Efficient Authentication Protocol Based on Elliptic Curve Cryptography for Mobile Networks
    Rajeswari, P. G.
    Thilagavathi, K.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (02): : 176 - 185
  • [8] Secure Mutual Authentication Protocol for RFID Based on Elliptic Curve Cryptography
    Alamr, Amjad Ali
    Kausar, Firdous
    Kim, Jong Sung
    2016 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2016,
  • [9] Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    R. Arshad
    N. Ikram
    Multimedia Tools and Applications, 2013, 66 : 165 - 178
  • [10] Construction of elliptic curve cryptography-based authentication protocol for internet of things
    Chhikara, Deepak
    Rana, Saurabh
    Mishra, Ankita
    Mishra, Dheerendra
    SECURITY AND PRIVACY, 2022, 5 (04)