Skip to main content
Erschienen in: Wireless Personal Communications 1/2015

01.07.2015

A Novel Remote User Authentication Scheme from Bilinear Pairings Via Internet

verfasst von: Chien-Lung Hsu, Yu-Hao Chuang, Chen-li Kuo

Erschienen in: Wireless Personal Communications | Ausgabe 1/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently, Manik et al. proposed a remote user authentication scheme using bilinear pairings, in which the user can login to a remote system with his own smart card. Some security flaws and improvements of Manik et al.’s scheme were investigated and proposed by researchers. One of the most comprehensive studies of this type was conducted by Fang and Huang in the same year. Fang and Huang showed types of potential attacks on Manik et al.’s scheme and further proposed an improved scheme. In this paper, we demonstrated that both Manik et al.’s and the Fang–Huang schemes are vulnerable to a range of attacks to show the claimed security requirements cannot be achieved. Therefore, we proposed a novel remote user authentication scheme from bilinear pairings via Internet, which can withstand the types of attacks that would threaten the previous schemes. The proposed scheme not only enhances the security of the remote user authentication scheme but also achieves high levels of performance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Boneh, D., & Franklin, M. (2001). Identity-based encryption from the weil pairing. Advances in Cryptology Crypto’01, 2139, 213–229.MathSciNet Boneh, D., & Franklin, M. (2001). Identity-based encryption from the weil pairing. Advances in Cryptology Crypto’01, 2139, 213–229.MathSciNet
2.
Zurück zum Zitat Chan, C. K., & Cheng, L. M. (2002). Cryptanalysis of a timestamp-based password authentication scheme. Computers and Security, 21(1), 74–76.CrossRef Chan, C. K., & Cheng, L. M. (2002). Cryptanalysis of a timestamp-based password authentication scheme. Computers and Security, 21(1), 74–76.CrossRef
3.
Zurück zum Zitat Chang, C. C., & Wu, T. C. (1993). Remote password authentication with smart cards. IEE Proceedings-E, 138(3), 165–168. Chang, C. C., & Wu, T. C. (1993). Remote password authentication with smart cards. IEE Proceedings-E, 138(3), 165–168.
4.
Zurück zum Zitat Chien, H. Y., Jan, J. K., & Tseng, Y. H. (2002). An efficient and practical solution to remote authentication: Smart card. Computers and Security, 21(4), 372–375.CrossRef Chien, H. Y., Jan, J. K., & Tseng, Y. H. (2002). An efficient and practical solution to remote authentication: Smart card. Computers and Security, 21(4), 372–375.CrossRef
7.
Zurück zum Zitat Giruka, V. C., Chakrabarti, S., & Singhal, M. (2006). A distributed multi-party key agreement protocol for dynamic collaborative groups using ECC original research article. Journal of Parallel and Distributed Computing, 66(7), 959–970.MATHCrossRef Giruka, V. C., Chakrabarti, S., & Singhal, M. (2006). A distributed multi-party key agreement protocol for dynamic collaborative groups using ECC original research article. Journal of Parallel and Distributed Computing, 66(7), 959–970.MATHCrossRef
8.
Zurück zum Zitat Hess, F. (2003). Efficient identity based signature schemes based on pairings. Selected Areas in Cryptography’02, 2595, 310–324.MathSciNet Hess, F. (2003). Efficient identity based signature schemes based on pairings. Selected Areas in Cryptography’02, 2595, 310–324.MathSciNet
9.
Zurück zum Zitat Hsu, C. L. (2004). Security of Chien et al.’s remote user authentication scheme using smart card. Computer Standards and Interfaces, 26(3), 167–169.CrossRef Hsu, C. L. (2004). Security of Chien et al.’s remote user authentication scheme using smart card. Computer Standards and Interfaces, 26(3), 167–169.CrossRef
10.
Zurück zum Zitat Islam, S. H., & Biswas, G. P. (2011). A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Journal of Systems and Software, 84(11), 1892–1898.CrossRef Islam, S. H., & Biswas, G. P. (2011). A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Journal of Systems and Software, 84(11), 1892–1898.CrossRef
11.
Zurück zum Zitat Juang, W. S. (2004). Efficient password authenticated key agreement using smart cards. Computers and Security, 23(2), 167–173.CrossRef Juang, W. S. (2004). Efficient password authenticated key agreement using smart cards. Computers and Security, 23(2), 167–173.CrossRef
12.
Zurück zum Zitat Khedr, W. I. (2013). SRFID: A hash-based security scheme for low cost RFID systems. Egyptian Informatics Journal, 14(1), 89–98.MathSciNetCrossRef Khedr, W. I. (2013). SRFID: A hash-based security scheme for low cost RFID systems. Egyptian Informatics Journal, 14(1), 89–98.MathSciNetCrossRef
13.
Zurück zum Zitat Ku, W. C., Chuang, H. M., & Chiang, M. H. (2005). Cryptanalysis of a multi-server password authenticated key agreement scheme using smart cards. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E88–A(11), 3235–3238.CrossRef Ku, W. C., Chuang, H. M., & Chiang, M. H. (2005). Cryptanalysis of a multi-server password authenticated key agreement scheme using smart cards. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E88–A(11), 3235–3238.CrossRef
14.
Zurück zum Zitat Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770–772.MathSciNetCrossRef Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770–772.MathSciNetCrossRef
15.
Zurück zum Zitat Liaw, H. T., Lin, J. F., & Wu, W. C. (2007). A new electronic traveler’s check scheme based on one-way hash function original research article. Electronic Commerce Research and Applications, 6(4), 499–508.CrossRef Liaw, H. T., Lin, J. F., & Wu, W. C. (2007). A new electronic traveler’s check scheme based on one-way hash function original research article. Electronic Commerce Research and Applications, 6(4), 499–508.CrossRef
16.
Zurück zum Zitat Manik, L. D., Saxena, A., Gulati, V. P., & Phatak, D. B. (2006). A novel remote user authentication scheme using bilinear pairings. Computers and Security, 25(3), 184–189.CrossRef Manik, L. D., Saxena, A., Gulati, V. P., & Phatak, D. B. (2006). A novel remote user authentication scheme using bilinear pairings. Computers and Security, 25(3), 184–189.CrossRef
17.
Zurück zum Zitat Paterson, K. G. (2002). ID-based signature from pairings on elliptic curves. IEEE Communications Letters, 38(18), 1025–1026. Paterson, K. G. (2002). ID-based signature from pairings on elliptic curves. IEEE Communications Letters, 38(18), 1025–1026.
18.
Zurück zum Zitat Shamir, A. (1984). Identity-based cryptosystems and signature schemes. Advances in Cryptology Crypto’84, 196, 47–53.MathSciNet Shamir, A. (1984). Identity-based cryptosystems and signature schemes. Advances in Cryptology Crypto’84, 196, 47–53.MathSciNet
19.
Zurück zum Zitat Shieh, W. G., & Wang, J. M. (2005). Efficient remote mutual authentication and key agreement. Computers and Security, 25(1), 72–77.CrossRef Shieh, W. G., & Wang, J. M. (2005). Efficient remote mutual authentication and key agreement. Computers and Security, 25(1), 72–77.CrossRef
20.
Zurück zum Zitat Sun, H. M., Hsieh, B. T., & Tseng, S. M. (2005). On the security of some proxy blind signature schemes. Journal of Systems and Software, 74(3), 297–302.CrossRef Sun, H. M., Hsieh, B. T., & Tseng, S. M. (2005). On the security of some proxy blind signature schemes. Journal of Systems and Software, 74(3), 297–302.CrossRef
21.
Zurück zum Zitat Tan, K., & Zhu, H. (1999). Remote password authentication scheme based on cross-product. Computer Communications, 1(18), 390–393.CrossRef Tan, K., & Zhu, H. (1999). Remote password authentication scheme based on cross-product. Computer Communications, 1(18), 390–393.CrossRef
23.
Zurück zum Zitat Tsai, J. L. (2009). Convertible multi-authenticated encryption scheme with one-way hash function. Computer Communications, 32(5), 783–786.CrossRef Tsai, J. L. (2009). Convertible multi-authenticated encryption scheme with one-way hash function. Computer Communications, 32(5), 783–786.CrossRef
24.
Zurück zum Zitat Wang, S. J., & Chang, J. F. (1996). Smart card based secure password authentication scheme. Computers and Security, 15(3), 231–237.MathSciNetCrossRef Wang, S. J., & Chang, J. F. (1996). Smart card based secure password authentication scheme. Computers and Security, 15(3), 231–237.MathSciNetCrossRef
25.
Zurück zum Zitat Wu, T. C. (1995). Remote login authentication scheme based on a geometric approach. Computer Communications, 18(12), 959–963.CrossRef Wu, T. C. (1995). Remote login authentication scheme based on a geometric approach. Computer Communications, 18(12), 959–963.CrossRef
26.
Zurück zum Zitat Yang, W. H., & Shieh, S. P. (1999). Password authentication schemes with smart cards. Computers and Security, 18(8), 727–733.CrossRef Yang, W. H., & Shieh, S. P. (1999). Password authentication schemes with smart cards. Computers and Security, 18(8), 727–733.CrossRef
Metadaten
Titel
A Novel Remote User Authentication Scheme from Bilinear Pairings Via Internet
verfasst von
Chien-Lung Hsu
Yu-Hao Chuang
Chen-li Kuo
Publikationsdatum
01.07.2015
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2015
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-2386-2

Weitere Artikel der Ausgabe 1/2015

Wireless Personal Communications 1/2015 Zur Ausgabe

Neuer Inhalt