Practical Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on Elliptic Curve Cryptosystem

被引:0
|
作者
Wu, Shuhua [2 ]
Kang, Fei
Pu, Qiong [1 ]
机构
[1] Tongji Univ, CIMS Res Ctr, Shanghai, Peoples R China
[2] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai, Peoples R China
来源
JOURNAL OF INTERNET TECHNOLOGY | 2012年 / 13卷 / 03期
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
ID-Based; Mutual authentication; Key agreement; Anonymity; Mobile device; EXCHANGE PROTOCOL; CRYPTANALYSIS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most recently, Yang et al. proposed an ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem (ECC) in journal of Computer and Security. In this paper, we find some disadvantages in their scheme and thereafter propose such an improved scheme that overcomes all those disadvantages existing in their scheme while the merits are left unchanged. Our scheme provides more guarantees in security as follows: (1) our scheme combines two factors to protect its authentication mechanism. (2) our scheme can safely provide mutual authentication and key agreement with more desirable properties. (3) our scheme can provide anonymity for the user's identity. (4) our scheme carries the rigorous proof of the security. And yet, our scheme is simpler and more efficient than Yang et al.'s scheme. Therefore the end result is more practical for the users of mobile devices.
引用
收藏
页码:411 / 418
页数:8
相关论文
共 50 条
  • [1] An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
    Yang, Jen-Ho
    Chang, Chin-Chen
    [J]. COMPUTERS & SECURITY, 2009, 28 (3-4) : 138 - 143
  • [2] Remote mutual authentication and key agreement scheme based on elliptic curve cryptosystem
    Yoon, Eun-Jun
    [J]. TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2011, 19 (03) : 335 - 347
  • [3] A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
    Islam, S. K. Hafizul
    Biswas, G. P.
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (11) : 1892 - 1898
  • [4] A strong password-based remote mutual authentication with key agreement scheme on elliptic curve cryptosystem for portable devices
    Li, Xuelei
    Wen, Fengtong
    Cui, Shenjun
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 (02): : 217 - 222
  • [5] An enhanced ECC remote mutual authentication with key agreement scheme for mobile devices
    Luo, Ming
    Huang, Donghua
    Hu, Jun
    [J]. Journal of Software, 2013, 8 (12) : 3206 - 3213
  • [6] A SECURE AND EFFICIENT AUTHENTICATION WITH KEY AGREEMENT SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
    Qu, Juan
    Feng, Yuming
    Huang, Yi
    [J]. ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS, 2015, (34): : 101 - 112
  • [7] A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem
    Han Shen
    Neeraj Kumar
    Debiao He
    Jian Shen
    Naveen Chilamkurti
    [J]. The Journal of Supercomputing, 2016, 72 : 3588 - 3600
  • [8] A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem
    Shen, Han
    Kumar, Neeraj
    He, Debiao
    Shen, Jian
    Chilamkurti, Naveen
    [J]. JOURNAL OF SUPERCOMPUTING, 2016, 72 (09): : 3588 - 3600
  • [9] An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks
    Li, Xuelei
    Wen, Qiaoyan
    Zhang, Hua
    Jin, Zhengping
    [J]. INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2013, 23 (05) : 311 - 324
  • [10] Two-Factor User Authentication with Key Agreement Scheme Based on Elliptic Curve Cryptosystem
    Qu, Juan
    Tan, Xiao-Ling
    [J]. JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2014, 2014