Comments on ID-Based Client Authentication with Key Agreement Protocol on ECC for Mobile Client-Server Environment

作者: S. K. Hafizul Islam , G. P. Biswas

DOI: 10.1007/978-3-642-22714-1_65

关键词:

摘要: In 2011, Debiao et al. proposed an ID-based remote mutual authentication with key agreement scheme on ECC for mobile client-server environment [H. Debiao, C. Jianhua, H. Jin: An client protocol provable security, Information Fusion, 2011]. They claimed their provides and is secured against various known attacks. this paper, we show that has some other security flaws.

参考文章(25)
Aggelos Kiayias, Moti Yung, Self Protecting Pirates and Black-Box Traitor Tracing international cryptology conference. pp. 63- 79 ,(2001) , 10.1007/3-540-44647-8_4
Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo, Robust remote user authentication scheme international conference on information networking. pp. 935- 942 ,(2004) , 10.1007/978-3-540-25978-7_94
Richard Comley, Zhaohui Cheng, Manos Nistazakis, Luminita Vasiu, On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases. IACR Cryptology ePrint Archive. ,vol. 2005, pp. 129- ,(2005)
Adi Shamir, Identity-based cryptosystems and signature schemes international cryptology conference. ,vol. 196, pp. 47- 53 ,(1985) , 10.1007/3-540-39568-7_5
Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu, A Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards Informatica (lithuanian Academy of Sciences). ,vol. 19, pp. 285- 302 ,(2008) , 10.15388/INFORMATICA.2008.214
Yan-yan Wang, Jia-yong Liu, Feng-xia Xiao, Jing Dan, A more efficient and secure dynamic ID-based remote user authentication scheme Computer Communications. ,vol. 32, pp. 583- 585 ,(2009) , 10.1016/J.COMCOM.2008.11.008
R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM. ,vol. 26, pp. 96- 99 ,(1983) , 10.1145/357980.358017
Manik Lal Das, Ashutosh Saxena, Ved P. Gulati, Deepak B. Phatak, A novel remote user authentication scheme using bilinear pairings Computers & Security. ,vol. 25, pp. 184- 189 ,(2006) , 10.1016/J.COSE.2005.09.002