Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Examining Smart-Card Security under the Threat of Power Analysis Attacks
IEEE Transactions on Computers
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Mutual Authentication for Low-Power Mobile Devices
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
A Flexible User Authentication Scheme for Multi-server Internet Services
ICN '01 Proceedings of the First International Conference on Networking-Part 1
Key Agreement Protocols and Their Security Analysis
Proceedings of the 6th IMA International Conference on Cryptography and Coding
An Efficient and Secure Multi-Server Password Authentication Scheme using Smart Cards
CW '04 Proceedings of the 2004 International Conference on Cyberworlds
Threshold Password-Authenticated Key Exchange
Journal of Cryptology
Studying Software Implementations of Elliptic Curve Cryptography
ITNG '06 Proceedings of the Third International Conference on Information Technology: New Generations
PEITS '08 Proceedings of the 2008 Workshop on Power Electronics and Intelligent Transportation System
An improved bilinear pairing based remote user authentication scheme
Computer Standards & Interfaces
A secure dynamic ID based remote user authentication scheme for multi-server environment
Computer Standards & Interfaces
Computer Standards & Interfaces
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Authenticated key exchange secure against dictionary attacks
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
A secure dynamic identity based authentication protocol for multi-server architecture
Journal of Network and Computer Applications
Implementing cryptographic pairings on smartcards
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Batch verifications with ID-Based signatures
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Efficient password authenticated key agreement using bilinear pairings
Mathematical and Computer Modelling: An International Journal
A new remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
An efficient remote use authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Cryptanalysis of a remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
A modified remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Cryptanalysis of a modified remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
IEEE Transactions on Consumer Electronics
Efficient multi-server password authenticated key agreement using smart cards
IEEE Transactions on Consumer Electronics
An enhanced remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
A dynamic ID-based remote user authentication scheme
IEEE Transactions on Consumer Electronics
A remote password authentication scheme for multiserver architecture using neural networks
IEEE Transactions on Neural Networks
Editorial: Recent developments in high performance computing and security: An editorial
Future Generation Computer Systems
Hi-index | 0.00 |
With the widespread promotion in e-commerce, the number of service servers providing Internet applications to the users is usually more than one and hence secure authentication protocols for multi-server environment are required. On the other hand, people may obtain their service by using the mobile devices in ubiquitous computing environment. Considering the mobile devices with limited energy resources and computing capability, the design of the secure authentication scheme suitable for mobile clients is a nontrivial challenge. In 2008, Tseng et al. proposed a pairing-based user authentication scheme for mobile clients with limited computing capability. They claimed that their scheme can be well applied to the remote user authentication scheme for multi-server environment. However, Tseng et al.'s scheme cannot provide mutual authentication and session key agreement. In this paper, we will show that Tseng et al.'s scheme cannot withstand an insider attack, offline dictionary attack and malicious server attack. Hence, we present a novel pairing-based remote user authentication for multi-server environment. The proposed scheme first provides a more secure key distribution based on self-certified public keys (SCPKs) among the service servers. The proposed scheme can achieve mutual authentication and session key agreement. To withstand an offline dictionary attack due to mobile devices security breach, the proposed scheme enhances the password change phase with the help of the registration server. Security analysis shows that our scheme can withstand various possible attacks resulting from the multi-server environment. Performance analysis and function comparisons demonstrate that the proposed scheme is well suited for mobile clients.