2017
DOI: 10.1007/s12652-017-0622-1
|View full text |Cite
|
Sign up to set email alerts
|

An efficient certificateless user authentication and key exchange protocol for client-server environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 24 publications
(15 citation statements)
references
References 30 publications
0
15
0
Order By: Relevance
“…The anonymous test for equality exposes their scheme to attacks, and the use of public key certified by a certificate authority serves as a limitation to their scheme. However, our proposed scheme enables digital signing of the plaintext, delegating the test for equality to a third party via inverse trapdoor computation, and deployment of identity-based cryptosystem to eradicate the problem of key-escrow [39] associated with certificate authorities (CA). We observed that Carnard et al [2] and Alornyo et al [1] proposed constructions when improved will be useful in healthcare systems, such that plaintext keywords can be digitally signed to achieve a dual benefits of digital signature and public key encryption.…”
Section: Plaintext Checkable Cryptosystemmentioning
confidence: 99%
“…The anonymous test for equality exposes their scheme to attacks, and the use of public key certified by a certificate authority serves as a limitation to their scheme. However, our proposed scheme enables digital signing of the plaintext, delegating the test for equality to a third party via inverse trapdoor computation, and deployment of identity-based cryptosystem to eradicate the problem of key-escrow [39] associated with certificate authorities (CA). We observed that Carnard et al [2] and Alornyo et al [1] proposed constructions when improved will be useful in healthcare systems, such that plaintext keywords can be digitally signed to achieve a dual benefits of digital signature and public key encryption.…”
Section: Plaintext Checkable Cryptosystemmentioning
confidence: 99%
“…The scheme of (Hassan, Eltayieb, Elhabob, & Li, 2017) is based on certificateless public key cryptography for the client-server environment by Hassan et al's in 2017. The review analyses of different phases are as under: …”
Section: Review Analysis Of Scheme (Hassan Eltayieb Elhabob and LI mentioning
confidence: 99%
“…Herein the authentication phase of the scheme both server and client exchange the key to identify legality of both the peers and become authenticated as shown in the figure below:- (Hassan, Eltayieb, Elhabob, & Li, 2017) The (Hassan et al, 2017) claim that their scheme is well designed and secure against all known attacks but the insight study shows that (Hassan et al, 2017) still has some security loopholes in terms of replay, Denial-of-Service (DoS) and impersonation attacks and also failed to show strong user anonymity. The identity used in the scheme is not dynamic because the attacker can guess it anywhere when user login with the same identity.…”
Section: Authentication Phasementioning
confidence: 99%
See 1 more Smart Citation
“…IoT systems generate large volumes of data although only small parts from these data contain really useful information, especially with video data such as surveillance systems. IoTbased machine learning and cryptography techniques are receiving a lot of attention because IoT needs to be distrusted and complemented by new smart frameworks [2,3]. Accordingly, the researchers have proposed di erent machine learning techniques such as smart mobile devices [4][5][6], blockchain-based smart vehicles [7], and analytics techniques in big data such as anomaly detection [8].…”
Section: Introductionmentioning
confidence: 99%