Two-factor remote authentication protocol with user anonymity based on elliptic curve cryptography

Zhang, Liping, Tang, Shanyu, Chen, Jing and Zhu, Shaohui (2015) Two-factor remote authentication protocol with user anonymity based on elliptic curve cryptography. Wireless Personal Communications, 81 (1). pp. 53-75. ISSN 0929-6212

[img]
Preview
PDF
Two-factor remote authentication protocol with user anonymity based on elliptic curve cryptography.pdf - Accepted Version

Download (268kB) | Preview

Abstract

In order to provide secure remote access control, a robust and efficient authentication protocol should realize mutual authentication and session key agreement between clients and the remote server over public channels. Recently, Chun-Ta Li proposed a password authentication and user anonymity protocol by using smart cards, and they claimed that their protocol has satisfied all criteria required by remote authentication. However, we have found that his protocol cannot provide mutual authentication between clients and the remote server. To realize ‘real’ mutual authentication, we propose a two-factor remote authentication protocol based on elliptic curve cryptography in this paper, which not only satisfies the criteria but also bears low computational cost. Detailed analysis shows our proposed protocol is secure and more suitable for practical application.

Item Type: Article
Additional Information: © Springer Science+Business Media New York 2014. The final publication is available at Springer via https://doi.org/10.1007/s11277-014-2117-0
Uncontrolled Keywords: Authentication; Key agreement; User anonymity; Elliptic curve; Smart card
Subjects: Computing > Information security > Cyber security
Computing > Information security
Depositing User: Shanyu Tang
Date Deposited: 27 Sep 2017 16:28
Last Modified: 28 Sep 2017 08:26
URI: http://repository.uwl.ac.uk/id/eprint/3949

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item

Menu