Skip to main content
Erschienen in: The Journal of Supercomputing 5/2018

30.11.2017

A key agreement authentication protocol using an improved parallel Pollard rho for electronic payment system

verfasst von: O. R. Vincent, O. M. Lawal

Erschienen in: The Journal of Supercomputing | Ausgabe 5/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

An improved protocol with a key agreement authentication using parallel Pollard rho algorithm for electronic payment system is proposed in this paper. The protocol employs a two step of key agreement and authentication with parallel Pollard rho and encryption of transaction information using Elliptic Curve Digital Signature Algorithm (ECDSA). Pollard rho was used in parallel as a key calculator that measures attack on discrete logarithm problem (DLP) of three main e-payment parties, namely customer, merchant and bank. Customers card information was used to infer the discrete logarithm problem which in turn was reused by the merchant and bank. The ECDSA was applied to encrypt information, resulting in a combination of the summation of participatory key, l. The length l serves as a diversion against intruders’ attempt to guess the DLP. The result shows that the protocol ensured higher security within a shorter period of time in comparison with others in the literature.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abdurahmonov T, Yeoh ET, Hussain HM (2011) Improving smart card security using elliptic curve cryptography over prime field (f p). In: Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2011. Springer, pp 127–140 Abdurahmonov T, Yeoh ET, Hussain HM (2011) Improving smart card security using elliptic curve cryptography over prime field (f p). In: Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2011. Springer, pp 127–140
2.
Zurück zum Zitat Antoniou G, Batten L (2011) E-commerce: protecting purchaser privacy to enforce trust. Electron Commer Res 11(4):421CrossRef Antoniou G, Batten L (2011) E-commerce: protecting purchaser privacy to enforce trust. Electron Commer Res 11(4):421CrossRef
3.
Zurück zum Zitat Arshad H, Nikooghadam M (2015) Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol. Supercomputing 71(8):3163–3180CrossRef Arshad H, Nikooghadam M (2015) Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol. Supercomputing 71(8):3163–3180CrossRef
4.
Zurück zum Zitat Arshad H, Nikooghadam M (2016) An efficient and secure authentication and key agreement scheme for session initiation protocol using ecc. Multimed Tools Appl 75(1):181–197CrossRef Arshad H, Nikooghadam M (2016) An efficient and secure authentication and key agreement scheme for session initiation protocol using ecc. Multimed Tools Appl 75(1):181–197CrossRef
5.
Zurück zum Zitat Bakhtiari S, Baraani A, Khayyambashi MR (2009) Mobicash: a new anonymous mobile payment system implemented by elliptic curve cryptography. In: Computer science and information engineering, 2009 WRI World Congress on, vol 3. IEEE, pp 286–290 Bakhtiari S, Baraani A, Khayyambashi MR (2009) Mobicash: a new anonymous mobile payment system implemented by elliptic curve cryptography. In: Computer science and information engineering, 2009 WRI World Congress on, vol 3. IEEE, pp 286–290
6.
Zurück zum Zitat Bernstein DJ, Lange T, Schwabe P (2011) On the correct use of the negation map in the pollard rho method. In: International Workshop on Public Key Cryptography. Springer, pp 128–146 Bernstein DJ, Lange T, Schwabe P (2011) On the correct use of the negation map in the pollard rho method. In: International Workshop on Public Key Cryptography. Springer, pp 128–146
7.
Zurück zum Zitat Bos JW, Kaihara ME, Kleinjung T, Lenstra AK, Montgomery PL (2012) Solving a 112-bit prime elliptic curve discrete logarithm problem on game consoles using sloppy reduction. Int J Appl Cryptogr 2(3):212–228MathSciNetCrossRefMATH Bos JW, Kaihara ME, Kleinjung T, Lenstra AK, Montgomery PL (2012) Solving a 112-bit prime elliptic curve discrete logarithm problem on game consoles using sloppy reduction. Int J Appl Cryptogr 2(3):212–228MathSciNetCrossRefMATH
8.
Zurück zum Zitat Boss E, Schwabe P, Batina L (2015) Solving prime-field ecdlps on gpus with opencl. Master’s thesis, Radboud University Nijmege Boss E, Schwabe P, Batina L (2015) Solving prime-field ecdlps on gpus with opencl. Master’s thesis, Radboud University Nijmege
9.
Zurück zum Zitat Ch SA, Sher M, Ghani A, Naqvi H, Irshad A et al (2015) An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography. Multimed Tools Appl 74(5):1711–1723CrossRef Ch SA, Sher M, Ghani A, Naqvi H, Irshad A et al (2015) An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography. Multimed Tools Appl 74(5):1711–1723CrossRef
10.
Zurück zum Zitat Chang CC, Chang SC, Lee JS (2009) An on-line electronic check system with mutual authentication. Comput Electr Eng 35(5):757–763CrossRefMATH Chang CC, Chang SC, Lee JS (2009) An on-line electronic check system with mutual authentication. Comput Electr Eng 35(5):757–763CrossRefMATH
11.
Zurück zum Zitat Chaudhry SA, Farash MS, Naqvi H, Sher M (2016) A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography. Electron Commer Res 16(1):113–139CrossRef Chaudhry SA, Farash MS, Naqvi H, Sher M (2016) A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography. Electron Commer Res 16(1):113–139CrossRef
12.
Zurück zum Zitat Chaudhry SA, Naqvi H, Sher M, Farash MS, Hassan MU (2017) An improved and provably secure privacy preserving authentication protocol for sip. Peer-to-Peer Netw Appl 10(1):1–15CrossRef Chaudhry SA, Naqvi H, Sher M, Farash MS, Hassan MU (2017) An improved and provably secure privacy preserving authentication protocol for sip. Peer-to-Peer Netw Appl 10(1):1–15CrossRef
13.
Zurück zum Zitat Chou CH, Tsai KY, Lu CF (2013) Two ID-based authenticated schemes with key agreement for mobile environments. Supercomputing 66(2):973–988CrossRef Chou CH, Tsai KY, Lu CF (2013) Two ID-based authenticated schemes with key agreement for mobile environments. Supercomputing 66(2):973–988CrossRef
14.
Zurück zum Zitat Cheon JH, Hong J, Kim M (2008) Speeding up the Pollard rho method on prime fields. Springer, Berlin, pp 471–488MATH Cheon JH, Hong J, Kim M (2008) Speeding up the Pollard rho method on prime fields. Springer, Berlin, pp 471–488MATH
16.
Zurück zum Zitat Ezzouak S, Elamrani M, Azizi A (2014) A variant of pollards rho attack on elliptic curve cryptosystems. J Comput Sci 10:1575–1581CrossRef Ezzouak S, Elamrani M, Azizi A (2014) A variant of pollards rho attack on elliptic curve cryptosystems. J Comput Sci 10:1575–1581CrossRef
17.
Zurück zum Zitat Farash MS, Attari MA (2014) A secure and efficient identity-based authenticated key exchange protocol for mobile client-server networks. J Supercomput 69(1):395–411CrossRef Farash MS, Attari MA (2014) A secure and efficient identity-based authenticated key exchange protocol for mobile client-server networks. J Supercomput 69(1):395–411CrossRef
18.
Zurück zum Zitat Gallant R, Lambert R, Vanstone S (2000) Improving the parallelized pollard lambda search on anomalous binary curves. Math Comput Am Math Soc 69(232):1699–1705MathSciNetCrossRefMATH Gallant R, Lambert R, Vanstone S (2000) Improving the parallelized pollard lambda search on anomalous binary curves. Math Comput Am Math Soc 69(232):1699–1705MathSciNetCrossRefMATH
19.
Zurück zum Zitat Gayoso Martínez V, Hernández Encinas L, Queiruga Dios A (2015) Security and practical considerations when implementing the elliptic curve integrated encryption scheme. Cryptologia 39(3):244–269CrossRef Gayoso Martínez V, Hernández Encinas L, Queiruga Dios A (2015) Security and practical considerations when implementing the elliptic curve integrated encryption scheme. Cryptologia 39(3):244–269CrossRef
20.
Zurück zum Zitat Gebregiyorgis SW (2016) Algorithms for the elliptic curve discrete logarithm and the approximate common divisor problem. Ph.D. thesis, The University of Auckland Gebregiyorgis SW (2016) Algorithms for the elliptic curve discrete logarithm and the approximate common divisor problem. Ph.D. thesis, The University of Auckland
21.
Zurück zum Zitat Gu J, Park S, Song O, Lee J, Nah J, Sohn S (2003) Mobile pki: A pki-based authentication framework for the next generation mobile communications. In: Australasian Conference on Information Security and Privacy. Springer, pp 180–191 Gu J, Park S, Song O, Lee J, Nah J, Sohn S (2003) Mobile pki: A pki-based authentication framework for the next generation mobile communications. In: Australasian Conference on Information Security and Privacy. Springer, pp 180–191
22.
Zurück zum Zitat Hall J, Kilbank S, Barbeau M, Kranakis E (2001) Wpp: a secure payment protocol for supporting credit-and debit-card transactions over wireless networks. In: IEEE International Conference on Telecommunications (ICT). Citeseer Hall J, Kilbank S, Barbeau M, Kranakis E (2001) Wpp: a secure payment protocol for supporting credit-and debit-card transactions over wireless networks. In: IEEE International Conference on Telecommunications (ICT). Citeseer
23.
Zurück zum Zitat Hankerson D, Menezes AJ, Vanstone S (2006) Guide to elliptic curve cryptography. Springer, BerlinMATH Hankerson D, Menezes AJ, Vanstone S (2006) Guide to elliptic curve cryptography. Springer, BerlinMATH
24.
Zurück zum Zitat He D, Kumar N, Chilamkurti N, Lee JH (2014) Lightweight ecc based rfid authentication integrated with an id verifier transfer protocol. J Med Syst 38(10):1–6CrossRef He D, Kumar N, Chilamkurti N, Lee JH (2014) Lightweight ecc based rfid authentication integrated with an id verifier transfer protocol. J Med Syst 38(10):1–6CrossRef
25.
Zurück zum Zitat He D, Zhang Y, Chen J (2014) Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wirel Pers Commun 74(2):229–243CrossRef He D, Zhang Y, Chen J (2014) Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wirel Pers Commun 74(2):229–243CrossRef
26.
Zurück zum Zitat Hısıl H (2010) Elliptic curves, group law and efficient computation. Ph.D. thesis, Queensland University of Technology Hısıl H (2010) Elliptic curves, group law and efficient computation. Ph.D. thesis, Queensland University of Technology
27.
Zurück zum Zitat Hisil H, Wong KKH, Carter G, Dawson E (2009) Jacobi quartic curves revisited. In: Australasian Conference on Information Security and Privacy. Springer, pp 452–468 Hisil H, Wong KKH, Carter G, Dawson E (2009) Jacobi quartic curves revisited. In: Australasian Conference on Information Security and Privacy. Springer, pp 452–468
28.
Zurück zum Zitat Irshad A, Sher M, Chaudhary SA, Naqvi H, Farash MS (2016) An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre. Supercomputing 72(4):1623–1644CrossRef Irshad A, Sher M, Chaudhary SA, Naqvi H, Farash MS (2016) An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre. Supercomputing 72(4):1623–1644CrossRef
29.
Zurück zum Zitat Jansma N, Arrendondo B (2004) Performance comparison of elliptic curve and rsa digital signatures. nicj. net/files Jansma N, Arrendondo B (2004) Performance comparison of elliptic curve and rsa digital signatures. nicj. net/files
30.
Zurück zum Zitat Jiang Q, Ma J, Tian Y (2015) Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al. Int J Commun Syst 28(7):1340–1351CrossRef Jiang Q, Ma J, Tian Y (2015) Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al. Int J Commun Syst 28(7):1340–1351CrossRef
32.
Zurück zum Zitat Kumar P, Lee HJ (2011) Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks. In: Wireless Advanced (WiAd), 2011. IEEE, pp 241–245 Kumar P, Lee HJ (2011) Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks. In: Wireless Advanced (WiAd), 2011. IEEE, pp 241–245
33.
Zurück zum Zitat Langley A, Hamburg M (2016) Elliptic curves for security. Order 500:39,081 Langley A, Hamburg M (2016) Elliptic curves for security. Order 500:39,081
34.
Zurück zum Zitat Le XH, Khalid M, Sankar R, Lee S (2011) An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare. J Netw 6(3):355–364 Le XH, Khalid M, Sankar R, Lee S (2011) An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare. J Netw 6(3):355–364
35.
Zurück zum Zitat Lee WH, Miou CS, Kuan YF, Hsieh TL, Chou CM (2017) A peer-to-peer transaction authentication platform for mobile commerce with semi-offline architecture. Electron Commer Res 17:1–19CrossRef Lee WH, Miou CS, Kuan YF, Hsieh TL, Chou CM (2017) A peer-to-peer transaction authentication platform for mobile commerce with semi-offline architecture. Electron Commer Res 17:1–19CrossRef
36.
Zurück zum Zitat Li Sq, Wu Yd, Zhou Jy, Chen Kf (2008) A practical ssl server performance improvement algorithm based on batch rsa decryption. J Shanghai Jiaotong Univ (Sci) 13:67–70CrossRef Li Sq, Wu Yd, Zhou Jy, Chen Kf (2008) A practical ssl server performance improvement algorithm based on batch rsa decryption. J Shanghai Jiaotong Univ (Sci) 13:67–70CrossRef
37.
Zurück zum Zitat Li X, Wen Q, Zhang H, Jin Z (2013) An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks. Int J Netw Manag 23(5):311–324CrossRef Li X, Wen Q, Zhang H, Jin Z (2013) An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks. Int J Netw Manag 23(5):311–324CrossRef
38.
Zurück zum Zitat Lin P, Chen Hy, Fang Y, Jeng Jy, Lu Fs (2008) A secure mobile electronic payment architecture platform for wireless mobile networks. IEEE Trans Wirel Commun 7(7):1536-1276 Lin P, Chen Hy, Fang Y, Jeng Jy, Lu Fs (2008) A secure mobile electronic payment architecture platform for wireless mobile networks. IEEE Trans Wirel Commun 7(7):1536-1276
39.
Zurück zum Zitat Lu C, Chen Y, Bian Z (2004) An implementation of fast algorithm for elliptic curve cryptosystem over gf(p). J Electron (China) 21(4):346–352CrossRef Lu C, Chen Y, Bian Z (2004) An implementation of fast algorithm for elliptic curve cryptosystem over gf(p). J Electron (China) 21(4):346–352CrossRef
40.
Zurück zum Zitat Mandal S, Mohanty S, Majhi B (2016) Design of electronic payment system based on authenticated key exchange. Electron Commer Res 16:1–30 Mandal S, Mohanty S, Majhi B (2016) Design of electronic payment system based on authenticated key exchange. Electron Commer Res 16:1–30
41.
Zurück zum Zitat Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552MathSciNetCrossRef Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552MathSciNetCrossRef
42.
Zurück zum Zitat Mir O, Munilla J, Kumari S (2017) Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks. Peer-to-Peer Network Appl 10(1):79–91CrossRef Mir O, Munilla J, Kumari S (2017) Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks. Peer-to-Peer Network Appl 10(1):79–91CrossRef
43.
Zurück zum Zitat Mir O, van der Weide T, Lee CC (2015) A secure user anonymity and authentication scheme using avispa for telecare medical information systems. J Med Syst 39(9):1–16CrossRef Mir O, van der Weide T, Lee CC (2015) A secure user anonymity and authentication scheme using avispa for telecare medical information systems. J Med Syst 39(9):1–16CrossRef
44.
Zurück zum Zitat Okeya K, Kurumatani H, Sakurai K (2000) Elliptic curves with the montgomery-form and their cryptographic applications. In: Imai H, Zheng Y (eds) Public Key Cryptography. PKC 2000, vol 1751. Springer, Berlin, pp 238–257 Okeya K, Kurumatani H, Sakurai K (2000) Elliptic curves with the montgomery-form and their cryptographic applications. In: Imai H, Zheng Y (eds) Public Key Cryptography. PKC 2000, vol 1751. Springer, Berlin, pp 238–257
45.
Zurück zum Zitat Pan W, Zheng F, Zhao Y, Zhu WT, Jing J (2017) An efficient elliptic curve cryptography signature server with gpu acceleration. IEEE Trans Inf Forensics Secur 12(1):111–122CrossRef Pan W, Zheng F, Zhao Y, Zhu WT, Jing J (2017) An efficient elliptic curve cryptography signature server with gpu acceleration. IEEE Trans Inf Forensics Secur 12(1):111–122CrossRef
46.
Zurück zum Zitat Ruiz-Martínez A, Reverte ÓC, Gómez-Skarmeta AF (2012) Payment frameworks for the purchase of electronic products and services. Comput Stand Interfaces 34(1):80–92CrossRef Ruiz-Martínez A, Reverte ÓC, Gómez-Skarmeta AF (2012) Payment frameworks for the purchase of electronic products and services. Comput Stand Interfaces 34(1):80–92CrossRef
47.
Zurück zum Zitat Schwabe P (2014) Graphics processing units. In: Markantonakis K, Mayes K (eds) Secure Smart embedded devices, platforms and applications. Springer, pp 179–200 Schwabe P (2014) Graphics processing units. In: Markantonakis K, Mayes K (eds) Secure Smart embedded devices, platforms and applications. Springer, pp 179–200
48.
Zurück zum Zitat Seet MZ (2007) Elliptic curve cryptography improving the pollard-rho algorithm. Ph.D. thesis, School of Mathematics and Statistics, The University of New South Wales Seet MZ (2007) Elliptic curve cryptography improving the pollard-rho algorithm. Ph.D. thesis, School of Mathematics and Statistics, The University of New South Wales
49.
Zurück zum Zitat Shen H, Kumar N, He D, Shen J, Chilamkurti N (2016) A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem. Supercomputing 72(9):3588–3600CrossRef Shen H, Kumar N, He D, Shen J, Chilamkurti N (2016) A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem. Supercomputing 72(9):3588–3600CrossRef
50.
Zurück zum Zitat Shi RH, Zhong H, Zhang S (2015) Comments on two schemes of identity-based user authentication and key agreement for mobile clientserver networks. In: Supercomputing, vol 71, no 11, Springer, pp 4015–4018 Shi RH, Zhong H, Zhang S (2015) Comments on two schemes of identity-based user authentication and key agreement for mobile clientserver networks. In: Supercomputing, vol 71, no 11, Springer, pp 4015–4018
51.
Zurück zum Zitat Stallings W (2006) Cryptography and network security: principles and practices. Pearson Education India, Delhi Stallings W (2006) Cryptography and network security: principles and practices. Pearson Education India, Delhi
52.
Zurück zum Zitat Suo H, Wan J, Zou C, Liu J (2012) Security in the internet of things: a review. In: 2012 International Conference On Computer Science and Electronics Engineering (ICCSEE), vol 3. IEEE, pp 648–651 Suo H, Wan J, Zou C, Liu J (2012) Security in the internet of things: a review. In: 2012 International Conference On Computer Science and Electronics Engineering (ICCSEE), vol 3. IEEE, pp 648–651
53.
Zurück zum Zitat Tan Z (2012) An efficient identity-based tripartite authenticated key agreement protocol. Electron Commer Res 12(4):505–518CrossRef Tan Z (2012) An efficient identity-based tripartite authenticated key agreement protocol. Electron Commer Res 12(4):505–518CrossRef
55.
Zurück zum Zitat Tiwari A, Sanyal S, Abraham A, Knapskog SJ, Sanyal S (2011) A multi-factor security protocol for wireless payment-secure web authentication using mobile devices. arXiv preprint arXiv:1111.3010 Tiwari A, Sanyal S, Abraham A, Knapskog SJ, Sanyal S (2011) A multi-factor security protocol for wireless payment-secure web authentication using mobile devices. arXiv preprint arXiv:​1111.​3010
56.
Zurück zum Zitat Tu H, Kumar N, Chilamkurti N, Rho S (2015) An improved authentication protocol for session initiation protocol using smart card. Peer-to-Peer Network Appl 8(5):903–910CrossRef Tu H, Kumar N, Chilamkurti N, Rho S (2015) An improved authentication protocol for session initiation protocol using smart card. Peer-to-Peer Network Appl 8(5):903–910CrossRef
57.
58.
Zurück zum Zitat Vincent OR, Folorunso O, Akinde A (2010) Improving e-payment security using elliptic curve cryptosystem. Electron Commer Res 10(1):27–41CrossRefMATH Vincent OR, Folorunso O, Akinde A (2010) Improving e-payment security using elliptic curve cryptosystem. Electron Commer Res 10(1):27–41CrossRefMATH
59.
Zurück zum Zitat Wang B, Li ZQ (2006) A forward-secure user authentication scheme with smart cards. Int J Network Secur 3(2):116–119 Wang B, Li ZQ (2006) A forward-secure user authentication scheme with smart cards. Int J Network Secur 3(2):116–119
60.
Zurück zum Zitat Wang H, Wang K, Zhang L, Li B (2011) Pairing computation on elliptic curves of jacobi quartic form. Chin J Electron 20(4):655–661 Wang H, Wang K, Zhang L, Li B (2011) Pairing computation on elliptic curves of jacobi quartic form. Chin J Electron 20(4):655–661
61.
Zurück zum Zitat Wang P, Zhang F (2013) Improving the parallelized pollard rho method for computing elliptic curve discrete logarithms. In: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT). IEEE, pp 285–291 Wang P, Zhang F (2013) Improving the parallelized pollard rho method for computing elliptic curve discrete logarithms. In: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT). IEEE, pp 285–291
62.
Zurück zum Zitat Washington LC (2008) Elliptic curves: number theory and cryptography. CRC Press, Baco RatonCrossRefMATH Washington LC (2008) Elliptic curves: number theory and cryptography. CRC Press, Baco RatonCrossRefMATH
63.
Zurück zum Zitat Wu S, Chen K (2012) An efficient key-management scheme for hierarchical access control in e-medicine system. J Med Systems 36(4):2325–2337CrossRef Wu S, Chen K (2012) An efficient key-management scheme for hierarchical access control in e-medicine system. J Med Systems 36(4):2325–2337CrossRef
64.
Zurück zum Zitat Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316–323CrossRef Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316–323CrossRef
65.
Zurück zum Zitat Yoon EJ, Yoo KY (2013) Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem. Supercomputing 63(1):235–255CrossRef Yoon EJ, Yoo KY (2013) Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem. Supercomputing 63(1):235–255CrossRef
66.
Zurück zum Zitat Zhang LP, Wang Y (2010) An id-based authenticated key agreement protocol for wireless sensor networks. J Commun 5(8):620–626CrossRef Zhang LP, Wang Y (2010) An id-based authenticated key agreement protocol for wireless sensor networks. J Commun 5(8):620–626CrossRef
Metadaten
Titel
A key agreement authentication protocol using an improved parallel Pollard rho for electronic payment system
verfasst von
O. R. Vincent
O. M. Lawal
Publikationsdatum
30.11.2017
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 5/2018
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-017-2204-6

Weitere Artikel der Ausgabe 5/2018

The Journal of Supercomputing 5/2018 Zur Ausgabe