Efficient mobile dynamic ID authentication and key agreement scheme without trusted servers

作者: Han-Yu Lin

DOI: 10.1002/DAC.2818

关键词:

摘要: SUMMARY Remote user authentication schemes allow an authorized to access the resources of remote servers. A dynamic ID scheme further provides property anonymity, that is, information identification will not be compromised even if communicated messages are intercepted. When it comes mobile authentication, client-side processing capability is usually concerned most. In this paper, author proposes efficient and key agreement without trusted For facilitating application devices with limited capability, our optimized for computation. Moreover, compared related works, proposed also more secure. Copyright © 2014 John Wiley & Sons, Ltd.

参考文章(27)
Hong-bin Tang, Xin-song Liu, Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme International Journal of Communication Systems. ,vol. 25, pp. 1639- 1644 ,(2012) , 10.1002/DAC.2428
Xiong Li, Jianwei Niu, Junguo Liao, Wei Liang, Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update International Journal of Communication Systems. ,vol. 28, pp. 374- 382 ,(2015) , 10.1002/DAC.2676
Bae-Ling Chen, Wen-Chung Kuo, Lih-Chyau Wuu, Robust smart-card-based remote user password authentication scheme International Journal of Communication Systems. ,vol. 27, pp. 377- 389 ,(2014) , 10.1002/DAC.2368
W.-C. KU, Impersonation Attack on a Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards IEICE Transactions on Communications. ,vol. E88-B, pp. 2165- 2167 ,(2005) , 10.1093/IETCOM/E88-B.5.2165
Eun-Jun Yoon, Kee-Young Yoo, Improving the dynamic ID-Based remote mutual authentication scheme international conference on move to meaningful internet systems. pp. 499- 507 ,(2006) , 10.1007/11915034_73
Chin‐Chen Chang, Ting‐Fang Cheng, Hsiao‐Ling Wu, None, An authentication and key agreement protocol for satellite communications International Journal of Communication Systems. ,vol. 27, pp. 1994- 2006 ,(2014) , 10.1002/DAC.2448
Qi Jiang, Jianfeng Ma, Youliang Tian, Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al. International Journal of Communication Systems. ,vol. 28, pp. 1340- 1351 ,(2015) , 10.1002/DAC.2767
Wen-Shenq Juang, Jing-Lin Wu, Two efficient two-factor authenticated key exchange protocols in public wireless LANs Computers & Electrical Engineering. ,vol. 35, pp. 33- 40 ,(2009) , 10.1016/J.COMPELECENG.2008.03.002
He Debiao, Chen Jianhua, Zhang Rui, A More Secure Authentication Scheme for Telecare Medicine Information Systems Journal of Medical Systems. ,vol. 36, pp. 1989- 1995 ,(2012) , 10.1007/S10916-011-9658-5
Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei, Robust authentication and key agreement scheme preserving the privacy of secret key Computer Communications. ,vol. 34, pp. 274- 280 ,(2011) , 10.1016/J.COMCOM.2010.04.005