Zhang, Liping, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Chen, Jing and Zhu, Shaohui (2015) Two-factor remote authentication protocol with user anonymity based on elliptic curve cryptography. Wireless Personal Communications, 81 (1). pp. 53-75. ISSN 0929-6212
Preview |
PDF
Two-factor remote authentication protocol with user anonymity based on elliptic curve cryptography.pdf - Accepted Version Download (268kB) | Preview |
Abstract
In order to provide secure remote access control, a robust and efficient authentication protocol should realize mutual authentication and session key agreement between clients and the remote server over public channels. Recently, Chun-Ta Li proposed a password authentication and user anonymity protocol by using smart cards, and they claimed that their protocol has satisfied all criteria required by remote authentication. However, we have found that his protocol cannot provide mutual authentication between clients and the remote server. To realize ‘real’ mutual authentication, we propose a two-factor remote authentication protocol based on elliptic curve cryptography in this paper, which not only satisfies the criteria but also bears low computational cost. Detailed analysis shows our proposed protocol is secure and more suitable for practical application.
Item Type: | Article |
---|---|
Identifier: | 10.1007/s11277-014-2117-0 |
Additional Information: | © Springer Science+Business Media New York 2014. The final publication is available at Springer via https://doi.org/10.1007/s11277-014-2117-0 |
Keywords: | Authentication; Key agreement; User anonymity; Elliptic curve; Smart card |
Subjects: | Computing > Information security > Cyber security Computing > Information security |
Depositing User: | Shanyu Tang |
Date Deposited: | 27 Sep 2017 16:28 |
Last Modified: | 04 Nov 2024 12:05 |
URI: | https://repository.uwl.ac.uk/id/eprint/3949 |
Downloads
Downloads per month over past year
Actions (login required)
View Item |