An efficient nonce-based authentication scheme with key agreement

被引:14
|
作者
Chen, YC [1 ]
Yeh, LY [1 ]
机构
[1] Natl Chi Nan Univ, Dept Informat Management, Puli 545, Nantou, Taiwan
关键词
authentication; key agreement; Hash function; smart card; network security;
D O I
10.1016/j.amc.2004.11.004
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Many authentication protocols using smart cards have been proposed recently. In this article, we propose an efficient nonce-based authentication (ENA) protocol with key agreement. Generally, nonce-based authentication schemes require verification tables in servers to authenticate users. In ENA, both verification tables and synchronized time-stamps are not required. Thus, ENA can be easily implemented in both users and servers. ENA also provides key agreement based on the nonce values generated in authentication. The ENA protocol has several features including: (1) no verification table is required in a server; (2) time synchronization is not needed between users and servers; (3) both the communication and computation cost are extremely low; (4) it provides mutual authentication between users and servers; (5) it supports session key agreement. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:982 / 994
页数:13
相关论文
共 50 条
  • [1] Efficient nonce-based authentication scheme for session initiation protocol
    Tsai, Jia Lun
    [J]. International Journal of Network Security, 2009, 9 (01) : 12 - 16
  • [2] Efficient nonce-based authentication scheme using token-update
    Shi, Wenbo
    Yoo, Hyeong Seon
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 3, 2006, 3982 : 213 - 221
  • [3] Efficient nonce-based remote user authentication scheme using smart cards
    Lee, SW
    Kim, HS
    Yoo, KY
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (01) : 355 - 361
  • [4] An Improved Securer and Efficient Nonce-Based Authentication Scheme with Token-Update
    Liao, Chiu-Hsiung
    Wang, Ching-Te
    Chen, Hon-Chan
    [J]. INFORMATICA, 2010, 21 (03) : 349 - 359
  • [5] Nonce-Based Key Agreement Protocol Against Bad Randomness
    Kang, Burong
    Meng, Xinyu
    Zhang, Lei
    Sun, Yinxia
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2019, 30 (04) : 619 - 633
  • [6] New cryptanalysis paradigm on a nonce-based mutual authentication scheme
    School of Computer Science and Technology, Tianjin University, No 92 Weijin Road, Nankai District, Tianjin 300072, China
    不详
    [J]. Int. J. Netw. Secur., 2008, 1 (116-120):
  • [7] Security analysis of a nonce-based user authentication scheme using smart cards
    Nam, Junghyun
    Kim, Seungjoo
    Park, Sangjoon
    Won, Dongho
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (01) : 299 - 302
  • [8] An improvement on Lee et al.'s nonce-based authentication scheme
    Shieh, Wen-Gong
    Wang, Mei-Tzu
    [J]. WSEAS Transactions on Information Science and Applications, 2007, 4 (04): : 832 - 835
  • [9] An efficient and secure electronic micropayment systems using nonce-based authentication protocol
    Kim, Y
    Song, K
    Han, S
    [J]. INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, PROCEEDINGS, 1999, : 193 - 199
  • [10] High performance nonce-based authentication and key distribution protocols against password guessing attacks
    Yen, SM
    Liu, MT
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1997, E80A (11) : 2209 - 2217