Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
“Paramita wisdom” password authentication scheme without verification tables
Journal of Systems and Software
Password authentication with insecure communication
Communications of the ACM
Smart Card Handbook
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Implementation of ECC/ECDSA Cryptography Algorithms Based on Java Card
ICDCSW '02 Proceedings of the 22nd International Conference on Distributed Computing Systems
An Identity-Based Signature from Gap Diffie-Hellman Groups
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme
ACM SIGOPS Operating Systems Review
Cryptanalysis of a flexible remote user authentication scheme using smart cards
ACM SIGOPS Operating Systems Review
An efficient identity-based signature scheme with batch verifications
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Implementing cryptographic pairings on smartcards
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
A new two-party identity-based authenticated key agreement
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
An efficient and complete remote user authentication scheme using smart cards
Mathematical and Computer Modelling: An International Journal
A new remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
A remote user authentication scheme using smart cards with forward secrecy
IEEE Transactions on Consumer Electronics
Improved remote user authentication scheme using bilinear pairings
Proceedings of the 2009 International Conference on Hybrid Information Technology
DoS-resistant ID-based password authentication scheme using smart cards
Journal of Systems and Software
Towards generalized ID-based user authentication for mobile multi-server environment
International Journal of Communication Systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Future Generation Computer Systems
Further analysis of pairing-based traitor tracing schemes for broadcast encryption
Security and Communication Networks
The Journal of Supercomputing
Hi-index | 0.00 |
With rapid growth of mobile wireless networks, handheld devices are popularly used by people and many mobile applications have been rapidly developed. Considering the limited computing capability of smart cards or mobile devices, the security scheme design suitable for these mobile devices is a nontrivial challenge. A user authentication scheme is a mechanism to authenticate a remote user over an open network. In 2006, Das et al. proposed an identity (ID)-based remote user authentication scheme with smart cards using bilinear pairings. Unfortunately, their scheme is insecure against forgery attack. Recently, Giri and Srivastava proposed an improved scheme to overcome the forgery attack. The computational cost required by the Giri-Srivastava scheme is expensive, especially for smart cards with limited computing capability. In addition, the Giri-Srivastava scheme is unable to be used for a multi-server environment. This paper presents an efficient and secure ID-based remote user authentication scheme using bilinear pairings. Based on the computational Diffie-Hellman assumption, we show that the proposed scheme is secure against existential forgery on adaptively chosen-message and ID attack in the random oracle model. As compared with the recently proposed pairing-based authentication schemes, our scheme has better performance in term of the computational cost and it is suitable for a multi-server environment in distributed networks. Performance analysis and experimental data of related pairing operations on smartcards are given to demonstrate that our scheme is well suited for mobile devices with limited computing capability.