Practical remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
نویسنده
چکیده
Most recently, Yang et al proposed an ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem in journal of Computer and Security. In this paper, we find some disadvantages in their scheme and thereafter propose such an improved scheme that overcomes all those disadvantages existing in their scheme while the merits are left unchanged. Our scheme provides more guarantees in security as follows: (1) our scheme combines two factors to protect its authentication mechanism. (2) our scheme can safely provide mutual authentication and key agreement with more desirable properties. (3) our scheme can provide anonymity for the user’s identity. And yet, our scheme is simpler and more efficient than Yang et al’s scheme. Therefore the end result is more practical for the users of mobile devices.
منابع مشابه
Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices
Recently, Yoon et al. and Wu proposed two improved remote mutual authentication and key agreement schemes for mobile devices on elliptic curve cryptosystem. In this paper, we show that Yoon et al.’s protocol fails to provide explicit key perfect forward secrecy and fails to achieve explicit key confirmation. We also point out Wu’s scheme decreases efficiency by using the double secret keys and ...
متن کاملAn enhanced ID-based remote mutual authentication with key agreement protocol for mobile devices on elliptic curve cryptosystem
Recently, Yoon et al. and Wu proposed two improved remote mutual authentication and key agreement scheme for mobile devices on elliptic curve cryptosystem. In this paper, we show that Yoon et al.’s protocol fails to provide explicit key perfect forward secrecy and fails to achieve explicit key confirmation. We also point out Wu’s scheme decreases efficiency by using the double secret keys and i...
متن کاملA strong password-based remote mutual authentication with key agreement scheme on elliptic curve cryptosystem for portable devices
In this paper, we cryptanalyze Kim et al.’s scheme and point out several weaknesses in their scheme. Off-line password guessing/dictionary attack could be effective. Moreover, we demonstrate that there is a mistake in their security analysis. To remedy the weaknesses, we propose a more secure, robust and practical scheme, which is designed for portable devices based upon the discrete logarithm ...
متن کاملA Secure and Efficient Authentication with Key Agreement Scheme Based on Elliptic Curve Cryptosystem
Recently, Li et al. [20] proposed an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks to remedy the weaknesses of Rhee et al.’s scheme. Li et al.’s scheme not only achieves mutual authentication, but also provides the procedure for key agreement and updates of secrets for users and servers. However, we find that Li et al.’s scheme is ...
متن کاملRemote mutual authentication and key agreement scheme based on elliptic curve cryptosystem
Remote mutual authentication is an important part of security, along with confidentiality and integrity, for systems that allow remote access over untrustworthy networks, like the Internet. In 2006, Shieh-Wang pointed out the weakness of Juang’s remote mutual authentication scheme using smart card and further proposed a novel remote user authentication scheme using smart card. However, this pap...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2009 شماره
صفحات -
تاریخ انتشار 2009