[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Vo et al., 2007 - Google Patents

Security enhancement of a remote user authentication scheme using bilinear pairings and ECC

Vo et al., 2007

View PDF
Document ID
8004125008854965926
Author
Vo D
Kim K
Publication year
Publication venue
2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)

External Links

Snippet

Remote authentication is an important mechanism to control user access to remote systems and a passwordbased authentication is a preferable method. With advances in elliptic curve cryptography, Jia et al.[10] proposed a remote user authentication scheme with a smart card …
Continue reading at koasas.kaist.ac.kr (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Card specific authentication in transaction processing
    • G06Q20/4097Mutual authentication between card and transaction partners
    • G06Q20/40975Use of encryption for mutual authentication

Similar Documents

Publication Publication Date Title
Boyen et al. Compact group signatures without random oracles
Brickell et al. A new direct anonymous attestation scheme from bilinear maps
Yap et al. An efficient certificateless signature scheme
US20180359097A1 (en) Digital signing by utilizing multiple distinct signing keys, distributed between two parties
US8225098B2 (en) Direct anonymous attestation using bilinear maps
Chen et al. Pairings in trusted computing
Zhu et al. An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
Tian et al. Secure limitation analysis of public-key cryptography for smart card settings
Ranjani et al. An Extended Identity Based Authenticated Asymmetric Group Key Agreement Protocol.
Kar ID-based deniable authentication protocol based on Diffie-Hellman problem on elliptic curve
Giri et al. An improved remote user authentication scheme with smart cards using bilinear pairings
Chou et al. Improvement of Manik et al.¡¦ s remote user authentication scheme
Feng et al. A new certificate-based digital signature scheme in bilinear group
Karati et al. Efficient and provably secure random oracle‐free adaptive identity‐based encryption with short‐signature scheme
Kwon Virtual software tokens-a practical way to secure PKI roaming
Byun PDAKE: a provably secure PUF-based device authenticated key exchange in cloud setting
Geng et al. A dynamic ID-based user authentication and key agreement scheme for multi-server environment using bilinear pairings
Vo et al. Security enhancement of a remote user authentication scheme using bilinear pairings and ECC
Yang et al. Novel remote user authentication scheme using bilinear pairings
Saadatmandan et al. Digital Certificate of Public Key for User Authentication and Session Key Establishment for Secure Network Communications
Chou A Novel k‐out‐of‐n Oblivious Transfer Protocol from Bilinear Pairing
Shao Cryptographic systems using a self-certified public key based on discrete logarithms
Saadatmandan et al. A secure authenticated key agreement protocol for application at digital certificat
Tso et al. Practical strong designated verifier signature schemes based on double discrete logarithms
Kim et al. One round identity-based authenticated conference key agreement protocol