2008
DOI: 10.15388/informatica.2008.214
|View full text |Cite
|
Sign up to set email alerts
|

A Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards

Abstract: With rapid growth of mobile wireless networks, handheld devices are popularly used by people and many mobile applications have been rapidly developed. Considering the limited computing capability of smart cards or mobile devices, the security scheme design suitable for these mobile devices is a nontrivial challenge. A user authentication scheme is a mechanism to authenticate a remote user over an open network. In 2006, Das et al. proposed an identity (ID)based remote user authentication scheme with smart cards… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
40
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
7

Relationship

3
4

Authors

Journals

citations
Cited by 68 publications
(40 citation statements)
references
References 28 publications
0
40
0
Order By: Relevance
“…From Table 1, it is noticeable that the schemes 10-12,21,23,29-31 do not sustain user anonymity; further, the protocols 10-12,21,23,24,29-31 do not withstand impersonation attack. Also, the schemes 12,21,24,29,30 fail to withstand many security threats which include mutual authentication and key establishment. In terms of providing security features, our scheme outperforms other related schemes.…”
Section: Protocol Featuresmentioning
confidence: 99%
See 1 more Smart Citation
“…From Table 1, it is noticeable that the schemes 10-12,21,23,29-31 do not sustain user anonymity; further, the protocols 10-12,21,23,24,29-31 do not withstand impersonation attack. Also, the schemes 12,21,24,29,30 fail to withstand many security threats which include mutual authentication and key establishment. In terms of providing security features, our scheme outperforms other related schemes.…”
Section: Protocol Featuresmentioning
confidence: 99%
“…The computational complexity of our scheme is compared with that of some related schemes. 10,11,[29][30][31]50 The registration process is a 1-time process in the authentication protocol. So, comparison of the complexity of executing each operation is performed only for the login and authentication phases.…”
Section: Computational Complexitymentioning
confidence: 99%
“…But, like Tseng et al [20], the scheme required time synchronization to protect from replay attack. Unfortunately, Liao and Hsiao [24] pointed out that the scheme of Tseng et al [19] also lacked mutual authentication with session key agreement, suffered from insider attack, password guessing attack, and replay attack, and advanced a pairings-based user authentication scheme using self-certified public keys. Liao and Hsiao claimed that their proposal could withstand various possible attacks and was well suited for multiserver environment Others several ID-based authentication protocols on elliptic curve cryptosystem (ECC) are proposed.…”
Section: Related Workmentioning
confidence: 99%
“…Here, we briefly review the concept of bilinear pairings. For the details of bilinear pairings, readers can refer to [11][12][13][14] for a full description. Let G 1 and G 2 be two multiplicative cyclic groups with the same large prime order q.…”
Section: Security Claim For the Design Of Pairing-based Traitor Tracimentioning
confidence: 99%