A Secure and Efficient Remote User Authentication Scheme for Multi-server Environments Using ECC |
Zhang, Junsong
(School of Computer and Communication Engineering, Zhengzhou University of Light Industry)
Ma, Jian (State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications) Li, Xiong (School of Computer Science and Engineering, Hunan University of Science and Technology) Wang, Wendong (State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications) |
1 | Y. P. Liao and C. M. Hsiao, "A novel multi-server remote user authentication scheme using self-certified public keys for mobile clients," Future Generation Computer Systems, vol. 29, no. 3, pp. 886-900, 2013. DOI ScienceOn |
2 | L. Lamport, "Password authentication with insecure communication," Communication of ACM, vol. 24, pp. 770-772, 1981. DOI ScienceOn |
3 | G. Horng, "Password authentication without using password table," Information Processing Letters, vol. 55, no. 5, pp. 247-250, 1995 DOI ScienceOn |
4 | J. K. Jan and Y. Y. Chen, "Paramita Wisdom password authentication scheme without verification tables," The Journal of Systems and Software, vol. 42, no.1, pp. 45-57, 1998. DOI ScienceOn |
5 | D. He, J. H. Chen and J. Hu, "An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security," Information Fusion, vol. 13, no. 3, pp. 223-230, 2012. DOI ScienceOn |
6 | M. S. Hwang, S. K. Chong and T. Y. Chen. "DoS-resistant ID-based password authentication scheme using smart cards," Journal of Systems and Software, vol. 83, no. 1, pp. 163-172, 2010. DOI ScienceOn |
7 | W. S. Juang, "Efficient multi-server password authenticated key agreement using smart cards," IEEE Transaction on Consumer Electronics, vol. 50, no. 1, pp. 251-255, 2004. DOI ScienceOn |
8 | R. G. Song. "Advanced smart card based password authentication protocol," Computer Standards & Interfaces, vol. 32, no. 5-6, pp. 321-325, 2010. DOI ScienceOn |
9 | X. Li, J. W. Niu, M.K. Khan and J. G. Liao. "An enhanced smart card based remote user password authentication scheme," Journal of Network and Computer Applications, vol. 36, no. 5, pp. 1365-1371, 2013. DOI ScienceOn |
10 | L. H. Li, L. C. Lin and M. S. Hwang, "A remote password authentication scheme for multi-server architecture using neural networks," IEEE Transactions on Neural Networks, vol. 12, no. 6, pp. 1498-504, 2001. DOI ScienceOn |
11 | C. C. Chang and J. S. Lee, "An efficient and secure multi-server password authentication scheme using smart cards," in Proc. of the third international conference on cyberworlds, pp. 417-22, November 2004. |
12 | J. L. Tsai, "Efficient multi-server authentication scheme based on one-way hash function without verification table," Computers & Security, vol. 27, no.3-4, pp. 115-21, 2008. DOI ScienceOn |
13 | Y. P. Liao and S. S. Wang, "A secure dynamic ID based remote user authentication scheme for multi-server environment," Computer Standard & Interfaces, vol. 31, no. 1, pp. 24-29, 2009. DOI ScienceOn |
14 | H. C. Hsiang and W. K. Shih, "Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment," Computer Standards & Interfaces, vol. 31, no. 6, pp. 1118-1123, 2009. DOI ScienceOn |
15 | C. C. Lee, T. H. Lin and R. X. Chang, "A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards," Expert Systems with Applications, vol. 38, no. 11, pp. 13863-13870, 2011. |
16 | S. K. Sood, A. K. Sarje and K. Singh, "A secure dynamic identity based authentication protocol for multi-server architecture," Journal of Network and Computer Applications, vol. 34, no. 2, pp. 609-618, 2011. DOI ScienceOn |
17 | X. Li, Y. P. Xiong, J. Ma and W. D. Wang. "An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards," Journal of Network and Computer Applications, vol. 35, no. 2, pp. 763-769, 2012. DOI ScienceOn |
18 | Y. H. Chuang and Y. M. Tseng, "Towards generalized ID-based user authentication for mobile multi-server environment," International Journal of Communication System, vol. 25, no. 4, pp. 447-460, 2012. DOI ScienceOn |
19 | X. Li, Y. Zhang, X. Liu and J. Cao, "A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card," KSII Transactions on Internet & Information Systems, Vol. 7 no. 5, pp. 1313-1327, 2013. DOI ScienceOn |
20 | X. Li, J. Ma, W. D. Wang, Y. P. Xiong and J. S. Zhang, "A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments," Mathematical and Computer Modelling, vol. 58, no. 1-2, pp. 85-95, 2013. DOI ScienceOn |
21 | C. Li, C. Lee and C. Weng, C. Fan, "An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity," KSII Transactions on Internet & Information Systems, Vol. 7 no. 1, pp. 119-131, 2013. DOI |
22 | J. Nam, K.K.R. Choo, M. Kim, J. Paik and D. Won, "Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols," KSII Transactions on Internet & Information Systems, Vol. 7, no. 12, pp. 3244-3260, 2013. DOI ScienceOn |
23 | M. L. Das, A. Saxena, V. P. Gulati and D. B. Phatak, "A novel remote client authentication protocol using bilinear pairings," Computer and Security, vol. 25, no. 3, pp. 184-189, 2006. DOI ScienceOn |
24 | G. F. Fang and G. X. Huang, "Improvement of recently proposed Remote User Authentication Schemes," http://eprint.iacr.org/2006/200. |
25 | D. Giri and P.D. Srivastava, "An improved remote client authentication protocol with smart cards using bilinear pairings," http://eprint.iacr.org/2006/274. |
26 | Shamus Software, http://www.shamus.ie/index.php. |
27 | J. Yang and C. Chang, "An ID-based remote mutual authentication with key agreement protocol for mobile devices on elliptic curve cryptosystem," Computers and Security, vol. 28, no. 3-4, pp. 138-143, 2009. DOI ScienceOn |
28 | D. Hankerson, A. Menezes and S. Vanstone, Guide to Elliptic Curve Cryptography, Springer, New York, 2004. http://dl.acm.org/citation.cfm?id=940321 |
29 | F. Li, X. Xin and Y. Hu, "Identity-based broadcast signcryption," Computer Standard and Interfaces, vol. 30, no. 1-2, pp. 89-94, 2008. DOI ScienceOn |
30 | P. Rogaway and T. Shrimpton, "Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance," Lecture Notes in Computer Science, vol. 3017, pp. 371-388, 2004. |
31 | J. M. David, W. Matt and D. S. Michael, "Implementing Public-Key Infrastructure for Sensor Networks," ACM Transactions on Sensor Networks, vol. 4, no. 4, pp. 1-23, 2008. |
32 | M. Scott, N. Costigan andW. Abdulwahab, "Implementing cryptographic pairings on smartcards," in Proc. of Cryptographic Hardware and Embedded Systems - CHES 2006, LNCS, vol. 4249, pp.134-147, Springer-Verlag, 2006. |
33 | M. Bellare, D. Pointcheval and P. Rogaway, "Authenticated key agreement secure against dictionary attacks," in Proc. of the Advances in Cryptology - EUROCRYPT 2000, LNCS, vol. 1807, pp. 139-155, Springer-Verlag, 2000. |