eUASBP: enhanced user authentication scheme based on bilinear pairing

被引:0
|
作者
Sangeetha Rajaram
Tanmoy Maitra
Satyanarayana Vollala
N. Ramasubramanian
Ruhul Amin
机构
[1] National Institute of Technology,Department of Computer Science and Engineering
[2] KIIT University,Department of Computer Science and Engineering
[3] IIIT,Department of Computer Science and Engineering
[4] IIIT,Department of Computer Science and Engineering
关键词
BAN logic; Authentication; Bilinear pairing; Session key agreement;
D O I
暂无
中图分类号
学科分类号
摘要
One of the cryptographic services i.e., authentication is very essential for the servers to identify authorized users and to neglect unauthorized users. In this work, we have considered Awasthi’s scheme and shown that the same scheme is vulnerable to several serious attacks. This paper not only describes the security pitfalls of Awasthi’s scheme but also designs a new scheme using bilinear pairing to protect the system from existing security drawbacks with other attractive features like strong mutual authentication, smart card stolen threat protection. Strong security of eUASBP is ensured through security analysis of eUASBP based on BAN logic. eUASBP reaches the BAN logic goals by the application of BAN rules. Our informal security analysis shows that proposed eUASBP provides security against attacks possible with smart card based applications. In addition to that eUASBP provides mutual authentication, session key agreement, and early wrong password detection. Bayat et al. authentication scheme also provides security against possible attacks of smart card based applications but doesn’t support session key agreement and early wrong password detection. Computation cost of eUASBP is less when compared with other authentication schemes. Since eUASBP uses less number of bilinear operations when compared with other related authentication schemes. The performance analysis shows that our protocol is more secure in comparison with state of the art and also better in terms of storage, computation and communication overheads.
引用
收藏
页码:2827 / 2840
页数:13
相关论文
共 50 条
  • [41] A new handover authentication protocol based on bilinear pairing functions for wireless networks
    He, Debiao
    Khan, Muhammad Khurram
    Kumar, Neeraj
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2015, 18 (1-2) : 67 - 74
  • [42] An enhanced biometrics-key-based remote user authentication scheme with smart card
    Xu, Qingui
    Huang, Peican
    Yang, Taolan
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (11): : 2645 - 2655
  • [43] An Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards
    Lu, Jian-Zhu
    Chen, Ting
    Zhou, Jipeng
    Yang, Jinjin
    Jiang, Junhui
    2013 6TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING (CISP), VOLS 1-3, 2013, : 1643 - 1648
  • [44] Security enhanced user authentication scheme for wireless sensor network
    Jannati, Hoda
    Falahati, Abolfazl
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (04) : 215 - 228
  • [45] SUALPPA scheme: Enhanced solution for user authentication in the GSM system
    Park, Mi-Og
    Park, Dea-Woo
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 883 - 892
  • [46] An enhanced remote user authentication scheme using smart cards
    Awasthi, AK
    Lal, S
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 583 - 586
  • [47] Efficient identity-based multicast scheme from bilinear pairing
    Wang, L
    Wu, CK
    IEE PROCEEDINGS-COMMUNICATIONS, 2005, 152 (06): : 877 - 882
  • [48] Provably secure randomized blind signature scheme based on bilinear pairing
    Fan, Chun-I
    Sun, Wei-Zhe
    Huang, Vincent Shi-Ming
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2010, 60 (02) : 285 - 293
  • [49] ID-based chameleon signature scheme from bilinear pairing
    Du, X.-J. (dxjwy2002@hotmail.com), 2005, South China University of Technology (33):
  • [50] A Key Agreement Scheme Based on Bilinear Pairing for Wireless Sensor Network
    Chen Hao
    Guo Yajun
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 384 - 388