A secure password-based authentication and key agreement scheme using smart cards

Journal of Information Security and Applications - Tập 23 - Trang 28-43 - 2015
Dheerendra Mishra1, Ashok Kumar Das2, Ankita Chaturvedi3, Sourav Mukhopadhyay
1Department of Mathematics, LNM Institute of Information Technology, Jaipur 302 031, India
2Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad 500 032, India
3Department of Mathematics, Indian Institute of Technology, Kharagpur 721 302, India

Tài liệu tham khảo

Armando, 2005, The AVISPA tool for the automated validation of internet security protocols and applications, 281 AVISPA AVISPA Basin, 2005, OFMC: a symbolic model checker for security protocols, Int J Inf Secur, 4, 181, 10.1007/s10207-004-0055-7 Bellare Boyd, 2003 Chang, 2013, An uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care, J Med Syst, 37, 9902, 10.1007/s10916-012-9902-7 Chatterjee, 2015, An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks, Secur Commun Netw, 8, 1752, 10.1002/sec.1140 Chen, 2012, Robust smart-card-based remote user password authentication scheme, Int J Commun Syst, 27, 377, 10.1002/dac.2368 Chuang, 2010, An efficient dynamic group key agreement protocol for imbalanced wireless networks, Int J Netw Manage, 20, 167 Clark, 1997 Das, 2013, A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications, Netw Sci, 2, 12, 10.1007/s13119-012-0009-8 Das, 2013, A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care, J Med Syst, 37, 1, 10.1007/s10916-013-9948-1 Das, 2012, Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem, Inf Sci (Ny), 209, 80, 10.1016/j.ins.2012.04.036 Dolev, 1983, On the security of public key protocols, IEEE Trans Inf Theory, 29, 198, 10.1109/TIT.1983.1056650 Eisenbarth, 2008, On the power of power analysis in the real world: a complete break of the keeloq code hopping scheme, 203 Jiang, 2015, Improvement of robust smart-card-based password authentication scheme, Int J Commun Syst, 28, 383, 10.1002/dac.2644 Kocher, 1999, Differential power analysis, 388 Lee, 2002, A remote user authentication scheme using hash functions, ACM SIGOPS Oper Syst Rev, 36, 23, 10.1145/583800.583803 Lee, 2005, Improved remote authentication scheme with smart card, Comput Stand Interfaces, 27, 177, 10.1016/j.csi.2004.06.001 Lee, 2005, Improvement of Chien et al.'s remote user authentication scheme using smart cards, Comput Stand Interfaces, 27, 181, 10.1016/j.csi.2004.02.002 Liao, 2006, A password authentication scheme over insecure networks, J Comput Syst Sci, 72, 727, 10.1016/j.jcss.2005.10.001 Mishra, 2014, A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards, Expert Syst Appl, 41, 8129, 10.1016/j.eswa.2014.07.004 National Institute of Standards and Technology (NIST), 1995 Odelu, 2014, A secure effective key management scheme for dynamic access control in a large leaf class hierarchy, Inf Sci (Ny), 269, 270, 10.1016/j.ins.2013.10.022 Odelu, 2015, A secure and efficient ecc-based user anonymity preserving single sign-on scheme for distributed computer networks, Secur Commun Netw, 8, 1732, 10.1002/sec.1139 Odelu, 2015, An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card, J Inf Secur Appl, 21, 1 Potlapally, 2006, A study of the energy consumption characteristics of cryptographic algorithms and security protocols, IEEE Trans Mob Comput, 5, 128, 10.1109/TMC.2006.16 Sarkar, 2010, A simple and generic construction of authenticated encryption with associated data, ACM Trans Inf Syst Secur, 13, 33, 10.1145/1880022.1880027 Song, 2010, Advanced smart card based password authentication protocol, Comput Stand Interfaces, 32, 321, 10.1016/j.csi.2010.03.008 Sood, 2010 Stinson, 2006, Some observations on the theory of cryptographic hash functions, Des Codes Cryptogr, 38, 259, 10.1007/s10623-005-6344-y Tsai, 2006, Password authentication schemes: current status and key issues, Int J Netw Secur, 3, 101 Wong, 2001, The performance measurement of cryptographic primitives on palm devices, 92 Xu, 2009, An improved smart card based password authentication scheme with provable security, Comput Stand Interfaces, 31, 723, 10.1016/j.csi.2008.09.006