2018
DOI: 10.1155/2018/3048697
|View full text |Cite
|
Sign up to set email alerts
|

An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment

Abstract: With the popularity of cloud computing, information security issues in the cloud environment are becoming more and more prominent. As the first line of defense to ensure cloud computing security, user authentication has attracted extensive attention. Though considerable efforts have been paid for a secure and practical authentication scheme in cloud computing environment, most attempts ended in failure. The design of a secure and efficient user authentication scheme for cloud computing remains a challenge on t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
2
1

Relationship

2
8

Authors

Journals

citations
Cited by 17 publications
(17 citation statements)
references
References 43 publications
0
17
0
Order By: Relevance
“…Many scholars [26][27][28][29][30][31][32][33][34][35][36][37][38][39][40][41][42][43] have studied the attacker model of password authentication protocol, among which the Dolev-Yao model [31] is the most classic. Due to the openness of the network, side channel attacks have developed rapidly in recent years (such as timing attacks, electromagnetic attacks and energy consumption attacks).…”
Section: Attacker Modelmentioning
confidence: 99%
“…Many scholars [26][27][28][29][30][31][32][33][34][35][36][37][38][39][40][41][42][43] have studied the attacker model of password authentication protocol, among which the Dolev-Yao model [31] is the most classic. Due to the openness of the network, side channel attacks have developed rapidly in recent years (such as timing attacks, electromagnetic attacks and energy consumption attacks).…”
Section: Attacker Modelmentioning
confidence: 99%
“…In terms of authentication schemes for cloud computing, some proposals have been presented one after another to improve the security and efficiency [14][15][16][17]. In 2015, Tsai and Lo [18] put forward an anonymous authentication protocol using bilinear pairing, in which the user can directly login the distributed server without the help of control server.…”
Section: Related Workmentioning
confidence: 99%
“…Elliptic curve cryptosystem (ECC) is one of the three types of public key cryptosystems that have been proved to be safe and effective so far, and is known for its high efficiency. The security of ECC is based on the intractability of elliptic curve discrete logarithm problem (ECDLP), and it has the advantages of short key, short signature, and small software implementation scale [35][36][37][38]. The elliptic curve defined on the finite field F(q) is as follows:…”
Section: Elliptic Curve Cryptosystemmentioning
confidence: 99%