2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing 2010
DOI: 10.1109/euc.2010.93
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Secure Bilinear Pairing Based Remote User Authentication Scheme with Smart Card

Abstract: Authentication schemes play vital roles in computer and communication security. In order to authenticate the remote users, password based schemes have been widely used. In this paper we introduce a secure remote user authentication scheme based on bilinear pairing that satisfies all security requirements which are mentioned for password based authentication schemes using smart card.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2014
2014
2015
2015

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(10 citation statements)
references
References 14 publications
0
10
0
Order By: Relevance
“…According to step A2 of the proposed scheme, U will be authenticated if Equations (11) and (17) hold. Equation (11) holds if W D W 0 .…”
Section: Proofmentioning
confidence: 99%
“…According to step A2 of the proposed scheme, U will be authenticated if Equations (11) and (17) hold. Equation (11) holds if W D W 0 .…”
Section: Proofmentioning
confidence: 99%
“…Authenticated key exchange schemes are being widely used in various environments [1][2][3][4][5]. A number of twoparty [6][7][8][9][10][11][12][13][14][15][16][17] and three-party authenticated key agreements [18][19][20][21][22][23][24] are available. Roaming service is provided by ubiquitous networks to permit a mobile node (MN) to use the services extended by his or her home agent (HA) in a foreign agent (FA).…”
Section: Introductionmentioning
confidence: 99%
“…[]. Subsequently, a large number of smart card‐based authentication schemes are proposed [,]. The past research on authentication has ascertained that the development of a correct authentication scheme is exceptionally difficult [] as smart card is a very small device equipped with limited computation, memory, and power resources.…”
Section: Introductionmentioning
confidence: 99%
“…So authentication schemes [] based on symmetric key primitives (hash, message authentication code , exclusive or, symmetric encryption, etc.) look more desirable instead of schemes [] based on expensive asymmetric primitives (point multiplication, exponentiation, pairing, etc. ), but keeping in mind the sensitivity of tasks (e.g., financial and health care) carried out by such schemes, which are also having additional threats as compared with traditional threats, asymmetric cryptography looks more promising which can resist impersonation, password guessing, and replay attacks.…”
Section: Introductionmentioning
confidence: 99%