An efficient nonce-based authentication scheme with key agreement

被引:14
|
作者
Chen, YC [1 ]
Yeh, LY [1 ]
机构
[1] Natl Chi Nan Univ, Dept Informat Management, Puli 545, Nantou, Taiwan
关键词
authentication; key agreement; Hash function; smart card; network security;
D O I
10.1016/j.amc.2004.11.004
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Many authentication protocols using smart cards have been proposed recently. In this article, we propose an efficient nonce-based authentication (ENA) protocol with key agreement. Generally, nonce-based authentication schemes require verification tables in servers to authenticate users. In ENA, both verification tables and synchronized time-stamps are not required. Thus, ENA can be easily implemented in both users and servers. ENA also provides key agreement based on the nonce values generated in authentication. The ENA protocol has several features including: (1) no verification table is required in a server; (2) time synchronization is not needed between users and servers; (3) both the communication and computation cost are extremely low; (4) it provides mutual authentication between users and servers; (5) it supports session key agreement. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:982 / 994
页数:13
相关论文
共 50 条
  • [21] Attacks and Improvement of an Efficient Remote Mutual Authentication and Key Agreement Scheme
    Holbl, Marko
    Welzer, Tatjana
    Brumen, Bostjan
    CRYPTOLOGIA, 2010, 34 (01) : 52 - 59
  • [22] Secure and Efficient Anonymous Authentication Key Agreement Scheme for Smart Industry
    Su, Xing
    Xie, Yong
    Wang, Hui
    Liu, Wei
    Shui, Dingyi
    2022 IEEE 28TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, ICPADS, 2022, : 250 - 257
  • [23] Selective timestamp-nonce based authentication scheme
    Wu, W.-C. (wwu@hsc.edu.tw), 1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Prof B.H.Kang's Office,, Australia (07):
  • [24] A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems
    Xu, Xin
    Zhu, Ping
    Wen, Qiaoyan
    Jin, Zhengping
    Zhang, Hua
    He, Lian
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (01)
  • [25] A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme
    Han, Lidong
    Xie, Qi
    Liu, Wenhao
    Wang, Shengbao
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (03) : 3391 - 3406
  • [26] HAKECC: Highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment
    Nikooghadam, Mahdi
    Shahriari, Hamid Reza
    Saeidi, Saeid Tousi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 76
  • [27] A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems
    Xin Xu
    Ping Zhu
    Qiaoyan Wen
    Zhengping Jin
    Hua Zhang
    Lian He
    Journal of Medical Systems, 2014, 38
  • [28] A secure and efficient authentication key agreement scheme for industrial internet of things based on edge computing
    Zhu W.
    Chen X.
    Jiang L.
    Alexandria Engineering Journal, 2024, 101 : 52 - 61
  • [29] ID-based key agreement and authentication scheme in WLAN
    Liu, Han
    Gu, Da-Wu
    Shi, Qing-Zu
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2005, 39 (08): : 1327 - 1330
  • [30] A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme
    Lidong Han
    Qi Xie
    Wenhao Liu
    Shengbao Wang
    Wireless Personal Communications, 2017, 95 : 3391 - 3406