Filters








711 Hits in 4.5 sec

A novel remote user authentication scheme using bilinear pairings

Manik Lal Das, Ashutosh Saxena, Ved P. Gulati, Deepak B. Phatak
2006 Computers & security  
The paper presents a remote user authentication scheme using the properties of bilinear pairings.  ...  The scheme prohibits the scenario of many logged in users with the same login-ID, and provides a flexible password change option to the registered users without any assistance from the remote system.  ...  In this paper, we present a remote user authentication scheme using the properties of bilinear pairings.  ... 
doi:10.1016/j.cose.2005.09.002 fatcat:asdoit5onrf23jokbz73czcpvq

Bilinear-pairing-based remote user authentication schemes using smart cards

Al-Sakib Khan Pathan, Choong Seon Hong
2009 Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication - ICUIMC '09  
This paper presents a detailed review of remote user authentication schemes with smart cards based on bilinear pairings.  ...  After reviewing all the relevant schemes, we propose our scheme which is designed in such a way that it could ensure all sorts of facilities needed for remote user authentication procedure and could resist  ...  [1] (will be termed as basic scheme throughout the rest of the paper) proposed a remote user authentication scheme using the properties of bilinear pairings.  ... 
doi:10.1145/1516241.1516303 dblp:conf/icuimc/PathanH09 fatcat:ww2rhx534vbtxihpeveplbuzae

Three Attacks On Jia Et Al.'S Remote User Authentication Scheme Using Bilinear Pairings And Ecc

Eun-Jun Yoon, Kee-Young Yoo
2011 Zenodo  
Recently, Jia et al. proposed a remote user authentication scheme using bilinear pairings and an Elliptic Curve Cryptosystem (ECC).  ...  In addition, the scheme can be vulnerable to server spoofing attack because it does not provide mutual authentication between the user and the remote server.  ...  [12] proposed a novel remote user authentication scheme using bilinear pairings, which allows a valid user to log in to the remote server, while prohibiting excessive users' with the same login-ID.  ... 
doi:10.5281/zenodo.1335052 fatcat:qjr2bdmzobedbpbqty2y3vuvcu

Security Enhancement of a Remote User Authentication Scheme Using Bilinear Pairings and ECC

Duc-Liem Vo, Kwangjo Kim
2007 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)  
Their scheme utilized bilinear pairings and an elliptic curve El-Gamal encryption scheme to provide a secure authentication mechanism.  ...  With advances in elliptic curve cryptography, Jia et al. [10] proposed a remote user authentication scheme with a smart card.  ...  [6] have proposed a novel remote authentication scheme with a smart card using bilinear pairings.  ... 
doi:10.1109/npc.2007.18 fatcat:dncbjuqfbbfyrkmw3d5hrhx6xq

Security Enhancement of a Remote User Authentication Scheme Using Bilinear Pairings and ECC

Duc-Liem Vo, Kwangjo Kim
2007 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)  
Their scheme utilized bilinear pairings and an elliptic curve El-Gamal encryption scheme to provide a secure authentication mechanism.  ...  With advances in elliptic curve cryptography, Jia et al. [10] proposed a remote user authentication scheme with a smart card.  ...  [6] have proposed a novel remote authentication scheme with a smart card using bilinear pairings.  ... 
doi:10.1109/icnpcw.2007.4351475 fatcat:xe4anxezivh5zeydx7sju3kqae

A Novel and Efficient Anonymous Authentication for WBANs †

Yang Liu, Yimin Wang, Zhenwan Peng
2021 Internet Technology Letters  
To overcome these drawbacks, we propose a new certificate-less anonymous authentication scheme in WBANs.  ...  to the remote doctors or experts for clinical diagnostics.  ...  The client's computation cost is 4T bp.m + T mtp ≈ 133.82 ms.Vijayakumar et al's authentication scheme should calculates 11 scalar multiplication operations related to a bilinear pairing, a bilinear pairing  ... 
doi:10.1002/itl2.304 fatcat:rsyc7ueulrejti5ccwwl3np2pu

A Review on Identity-Based Proxy Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

Mangala L, Rajendra A B
2014 IJARCCE  
A. CONCRETE ID-PUIC PROTOCOL This protocol based on 4 methods: 1. Original Client: User, which has enormous collection of data to be uploaded to public cloud server by proxy. 2.  ...  This paper gives entire information to overcome these problems using various protocols. formal and security model for ID-PUIC protocol.  ...  The concrete bilinear pairings e can be structured by using the Weil or Tate pairings on elliptic Curves.  ... 
doi:10.17148/ijarcce.2017.64153 fatcat:pjduvzcf4fg33mhk427yorc47a

An efficient dynamic ID-based remote user authentication scheme using self-certified public keys for multi-server environments

Shudong Li, Xiaobo Wu, Dawei Zhao, Aiping Li, Zhihong Tian, Xiaodong Yang, Hua Wang
2018 PLoS ONE  
To compensate for these shortcomings, we propose a novel dynamic IDbased remote user authentication scheme for multi-server environments based on pairing and self-certified public keys.  ...  Recently, Li et al. proposed a novel smart card and dynamic ID-based remote user authentication scheme for multi-server environments.  ...  The proposed scheme In this section, we propose a novel dynamic ID-based and non-RC-dependent remote user authentication scheme for multi-server environments using pairing and self-certified public keys  ... 
doi:10.1371/journal.pone.0202657 fatcat:2pywnxh26fgntl772b4uc6cgeq

Identity-Based Fast Authentication Scheme for Smart Mobile Devices in Body Area Networks

Chen Wang, Wenying Zheng, Sai Ji, Qi Liu, Anxi Wang
2018 Wireless Communications and Mobile Computing  
In this paper, we present a novel system named emergency medical system without the assistance of doctors.  ...  When a personal computer collects information from these devices, it needs to authenticate the identity of them. Some effective schemes have been put forward to the device authentication in WBANs.  ...  This attack uses a message that has been authenticated. If the scheme is not well designed, the old authentication message is likely to be used by malicious users to achieve their goals.  ... 
doi:10.1155/2018/4028196 fatcat:6jyuuar2rzaype2mv2tu72lyhe

Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks

Tong Li, Yuhui Zheng, Ti Zhou
2017 Security and Communication Networks  
In this paper, we propose an efficient authenticated key agreement scheme for WBANs and add the key update phase to enhance the security of the proposed scheme.  ...  Wireless body area networks (WBANs) are widely used in telemedicine, which can be utilized for real-time patients monitoring and home health-care.  ...  There is a computable algorithm to get e( , ) for all , ∈ G 1 . As is shown in [22] , the modified Tate pairing on a supersingular elliptic curve is such a bilinear pairing.  ... 
doi:10.1155/2017/4167549 fatcat:35z7lzd4dna5dc2lrxk32loddi

An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment [article]

Dawei Zhao, Haipeng Peng, Shudong Li, Yixian Yang
2013 arXiv   pre-print
s multi-server authentication scheme which is based on pairing and self-certified public keys, and propose a novel dynamic ID based remote user authentication scheme for multi-server environments.  ...  s multi-server authentication scheme and proposed a novel smart card and dynamic ID based remote user authentication scheme for multi-server environments.  ...  , we propose a novel dynamic ID based remote user authentication scheme for multi-server environment using pairing and self-certified public keys.  ... 
arXiv:1305.6350v1 fatcat:mrchtkxbrrc43k5wpkgjzzy6aq

A Secure and Effective Anonymous Integrity Checking Protocol for Data Storage in Multicloud

Lingwei Song, Dawei Zhao, Xuebing Chen, Chenlei Cao, Xinxin Niu
2015 Mathematical Problems in Engineering  
Most of previous work focuses on three aspects, which are providing data dynamics, public verifiability, and privacy against verifiers with the help of a third party auditor.  ...  In Section 3, a novel anonymous authentication protocol for remote verification user authentication scheme is proposed in multicloud storage.  ...  Meanwhile, when a mobile user remotes into a foreign network, mutual authentication must first be solved to prevent illegal use from accessing services and to ensure that mobile users are connected to  ... 
doi:10.1155/2015/614375 fatcat:rcqwp6iyc5gv3or5gxfrcjzp6y

Anonymous Authentication for Secure Mobile Agent Based Internet Business

Sivaraman Audithan, Thanjavur Swaminathan Murunya, Pandi Vijayakumar
2016 Circuits and Systems  
In such kind of Internet based applications, access must be secure and authentication takes a vital role to avoid malicious use of the system.  ...  In this paper, we propose an anonymous authentication scheme which potentially reduces the overall computation time needed for verifying the legitimacy of the users.  ...  Therefore, in this paper, we propose a new anonymous authentication scheme with privacy preserving during authentication based on bilinear pairing with less computational complexity.  ... 
doi:10.4236/cs.2016.78124 fatcat:iq25gqxdwvfc7axqajgiqw7jc4

A short anonymously revocable group signature scheme from decision linear assumption

Toru Nakanishi, Nobuo Funabiki
2008 Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS '08  
This identification is used for tracing a dishonest anonymous signer in case of an illegal act using the signature. However, P M can violate signers' anonymity.  ...  In group signature schemes, a signature is anonymous for a verifier, while only a designated Privacy Manager (P M ) can identify the signer.  ...  The DAA scheme is a variant of group signature scheme without P M , which is designed for the remote authentication of a Trusted Platform Module (TPM) while keeping user's privacy.  ... 
doi:10.1145/1368310.1368359 dblp:conf/ccs/NakanishiF08 fatcat:yjwuwj4w3rfsvkych6comstssu

An Efficient Integrity Verification and Authentication Scheme over the Remote Data in the Public Clouds for Mobile Users

S. Milton Ganesh, S. P. Manikandan
2020 Security and Communication Networks  
Firstly, a novel scheme is introduced to verify the integrity of the data stored in the remote cloud servers in the context of mobile users.  ...  In this line, modern day researchers have proposed many novel schemes for ensuring the remote data integrity, but they suffer from attacks or overheads due to computation and communication.  ...  Contributions of is Research Work (i) A novel scheme to verify the integrity of the remote data and to authenticate the mobile user during the integrity auditing process is introduced (ii) e presence of  ... 
doi:10.1155/2020/9809874 fatcat:24iczrzyabhmphcw277dbe4n4u
« Previous Showing results 1 — 15 out of 711 results