Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Password authentication with insecure communication
Communications of the ACM
Examining Smart-Card Security under the Threat of Power Analysis Attacks
IEEE Transactions on Computers
A remote user authentication scheme using hash functions
ACM SIGOPS Operating Systems Review
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
A secure user authentication scheme using hash functions
ACM SIGOPS Operating Systems Review
Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme
ACM SIGOPS Operating Systems Review
A password authentication scheme over insecure networks
Journal of Computer and System Sciences
A Remote User Authentication Scheme Using Bilinear Pairings and ECC
ISDA '06 Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications - Volume 02
Security flaws of remote user access over insecure networks
Computer Communications
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
Computer Standards & Interfaces
NGMAST '07 Proceedings of the The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies
Cryptanalysis of a password authentication scheme over insecure networks
Journal of Computer and System Sciences
A secure dynamic ID based remote user authentication scheme for multi-server environment
Computer Standards & Interfaces
A more efficient and secure dynamic ID-based remote user authentication scheme
Computer Communications
Computer Standards & Interfaces
Robust ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC
CSE '09 Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 02
Secure remote user access over insecure networks
Computer Communications
Efficient remote user authentication scheme using smart card
Computer Networks: The International Journal of Computer and Telecommunications Networking
ICICIC '09 Proceedings of the 2009 Fourth International Conference on Innovative Computing, Information and Control
An Advanced ECC ID-Based Remote Mutual Authentication Scheme for Mobile Devices
UIC-ATC '10 Proceedings of the 2010 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing
Guide to Elliptic Curve Cryptography
Guide to Elliptic Curve Cryptography
An efficient and complete remote user authentication scheme using smart cards
Mathematical and Computer Modelling: An International Journal
Certificateless strong designated verifier multisignature scheme using bilinear pairings
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Comments on an advanced dynamic ID-Based authentication scheme for cloud computing
WISM'12 Proceedings of the 2012 international conference on Web Information Systems and Mining
Two ID-based authenticated schemes with key agreement for mobile environments
The Journal of Supercomputing
Enhanced Dynamic Authentication Scheme (EDAS)
Information Systems Frontiers
Hi-index | 0.00 |
Recently, Yang and Chang proposed an identity-based remote login scheme using elliptic curve cryptography for the users of mobile devices. We have analyzed the security aspects of the Yang and Chang's scheme and identified some security flaws. Also two improvements of the Yang and Chang's scheme have been proposed recently, however, it has been found that the schemes have similar security flaws as in the Yang and Chang's scheme. In order to remove the security pitfalls of the Yang and Chang and the subsequent schemes, we proposed an enhanced remote user mutual authentication scheme that uses elliptic curve cryptography and identity-based cryptosystem with three-way challenge-response handshake technique. It supports flawless mutual authentication of participants, agreement of session key and the leaked key revocation capability. In addition, the proposed scheme possesses low power consumption, low computation cost and better security attributes. As a result, the proposed scheme seems to be more practical and suitable for mobile users for secure Internet banking, online shopping, online voting, etc.