2015
DOI: 10.1002/sec.1229
|View full text |Cite
|
Sign up to set email alerts
|

Privacy preserving smartcard-based authentication system with provable security

Abstract: In this paper, we suggest a new privacy preserving smartcard‐based password authenticated key exchange (SC‐PAKE) with provable security. Only the user who has two secrets (smartcard and password) can go through authentication with key exchange while concealing its identifier from outsider adversaries. For guaranteeing both authentication and identity (ID) protection, we define a security of session key and an anonymity of identifier. We also show that the proposed protocol satisfies two definitions under compu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 34 publications
0
6
0
Order By: Relevance
“…(1792 bits); however, it does not provide the security features like password exposure, smart card loss attack, sound repairability and user anonymity. Thus, our scheme has better performance than the related schemes [20], [14], [21].…”
Section: Performance Analysismentioning
confidence: 81%
See 3 more Smart Citations
“…(1792 bits); however, it does not provide the security features like password exposure, smart card loss attack, sound repairability and user anonymity. Thus, our scheme has better performance than the related schemes [20], [14], [21].…”
Section: Performance Analysismentioning
confidence: 81%
“…Communication cost(bits) Islam [20] 1408 + 1408 = 2816 Jiang et al [14] 2304 + 1152 = 3456 Bym [21] 2176 + 1152 = 3328 Truong [22] 640 + 1152 = 1792 Wang-Wang [16] 1536 + 1152 = 2688 Ours 1536 + 1152 = 2688 Table III presents the computational cost of our scheme along with the related schemes [20], [14], [21], [22], [16] in login and authentication phases. The computational cost of the schemes [20], [14], [21], [22], [16] and our scheme are, respectively, 5t e + 6t h , 6t e + 8t h , 10t e + 2t s + 8t h , 4t c + 14t h , 6t e + 16t h and 6t e + 17t h . The scheme [21] has the higher computaional cost as compared to that of ours and does not offer the security features like verifier table, password friendly and timely typo detection.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…About user anonymity, users on Internet requiring remote services may wish to do anonymously while still ensuring the confidentiality of their requests that services and resources received come from an authentic and qualified server . Thus, user anonymity is to provide a method for masking user's real identity during authentication, and no one can trace a specific user via transmitted messages.…”
Section: Introductionmentioning
confidence: 99%