2010
DOI: 10.5120/647-903
|View full text |Cite
|
Sign up to set email alerts
|

A Password-Authenticated Key Agreement Scheme Based on ECC Using Smart Cards

Abstract: Public Key Cryptography (PKC) is recently playing an essential role in electronic banking and financial transactions. Elliptic Curve Cryptography (ECC) is one of the best public key techniques for its small key size and high security and is suitable for secure access of smart cards because implementation on smart cards is challenging due to memory, bandwidth, and computation constraints. In this paper, we proposed a passwordauthenticated key agreement scheme based on ECC. Our scheme provides more guarantees in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…Juang et al [35], Debasish Jena et al [36], Aqeel Khalique et al [37] and our schemes are based on ECC. Table1 illustrates the computational cost for each phase.…”
Section: Cost Analysismentioning
confidence: 99%
“…Juang et al [35], Debasish Jena et al [36], Aqeel Khalique et al [37] and our schemes are based on ECC. Table1 illustrates the computational cost for each phase.…”
Section: Cost Analysismentioning
confidence: 99%
“…Very few schemes have been developed by the researchers which are based on ECC. In 2010, a password-authenticated key agreement scheme using smart cards was proposed by Khalique et al (2010). Their scheme was based on ECC and had relatively low cost as compared to other schemes.…”
Section: Smart Cards and Elliptic Curve Cryptographymentioning
confidence: 99%
“…There are different encryption techniques in which some are reliable based on some factors and some on other factors. It has become difficult to decide the kind of cryptographic algorithms to be used for information security [19].…”
Section: Introductionmentioning
confidence: 99%