A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A novel remote user authentication scheme using bilinear pairings
2006
Computers & security
The paper presents a remote user authentication scheme using the properties of bilinear pairings. ...
The scheme prohibits the scenario of many logged in users with the same login-ID, and provides a flexible password change option to the registered users without any assistance from the remote system. ...
In this paper, we present a remote user authentication scheme using the properties of bilinear pairings. ...
doi:10.1016/j.cose.2005.09.002
fatcat:asdoit5onrf23jokbz73czcpvq
Bilinear-pairing-based remote user authentication schemes using smart cards
2009
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication - ICUIMC '09
This paper presents a detailed review of remote user authentication schemes with smart cards based on bilinear pairings. ...
After reviewing all the relevant schemes, we propose our scheme which is designed in such a way that it could ensure all sorts of facilities needed for remote user authentication procedure and could resist ...
[1] (will be termed as basic scheme throughout the rest of the paper) proposed a remote user authentication scheme using the properties of bilinear pairings. ...
doi:10.1145/1516241.1516303
dblp:conf/icuimc/PathanH09
fatcat:ww2rhx534vbtxihpeveplbuzae
Three Attacks On Jia Et Al.'S Remote User Authentication Scheme Using Bilinear Pairings And Ecc
2011
Zenodo
Recently, Jia et al. proposed a remote user authentication scheme using bilinear pairings and an Elliptic Curve Cryptosystem (ECC). ...
In addition, the scheme can be vulnerable to server spoofing attack because it does not provide mutual authentication between the user and the remote server. ...
[12] proposed a novel remote user authentication scheme using bilinear pairings, which allows a valid user to log in to the remote server, while prohibiting excessive users' with the same login-ID. ...
doi:10.5281/zenodo.1335052
fatcat:qjr2bdmzobedbpbqty2y3vuvcu
Security Enhancement of a Remote User Authentication Scheme Using Bilinear Pairings and ECC
2007
2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)
Their scheme utilized bilinear pairings and an elliptic curve El-Gamal encryption scheme to provide a secure authentication mechanism. ...
With advances in elliptic curve cryptography, Jia et al. [10] proposed a remote user authentication scheme with a smart card. ...
[6] have proposed a novel remote authentication scheme with a smart card using bilinear pairings. ...
doi:10.1109/npc.2007.18
fatcat:dncbjuqfbbfyrkmw3d5hrhx6xq
Security Enhancement of a Remote User Authentication Scheme Using Bilinear Pairings and ECC
2007
2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)
Their scheme utilized bilinear pairings and an elliptic curve El-Gamal encryption scheme to provide a secure authentication mechanism. ...
With advances in elliptic curve cryptography, Jia et al. [10] proposed a remote user authentication scheme with a smart card. ...
[6] have proposed a novel remote authentication scheme with a smart card using bilinear pairings. ...
doi:10.1109/icnpcw.2007.4351475
fatcat:xe4anxezivh5zeydx7sju3kqae
A Novel and Efficient Anonymous Authentication for WBANs †
2021
Internet Technology Letters
To overcome these drawbacks, we propose a new certificate-less anonymous authentication scheme in WBANs. ...
to the remote doctors or experts for clinical diagnostics. ...
The client's computation cost is 4T bp.m + T mtp ≈ 133.82 ms.Vijayakumar et al's authentication scheme should calculates 11 scalar multiplication operations related to a bilinear pairing, a bilinear pairing ...
doi:10.1002/itl2.304
fatcat:rsyc7ueulrejti5ccwwl3np2pu
A Review on Identity-Based Proxy Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
2014
IJARCCE
A. CONCRETE ID-PUIC PROTOCOL This protocol based on 4 methods: 1. Original Client: User, which has enormous collection of data to be uploaded to public cloud server by proxy. 2. ...
This paper gives entire information to overcome these problems using various protocols. formal and security model for ID-PUIC protocol. ...
The concrete bilinear pairings e can be structured by using the Weil or Tate pairings on elliptic Curves. ...
doi:10.17148/ijarcce.2017.64153
fatcat:pjduvzcf4fg33mhk427yorc47a
An efficient dynamic ID-based remote user authentication scheme using self-certified public keys for multi-server environments
2018
PLoS ONE
To compensate for these shortcomings, we propose a novel dynamic IDbased remote user authentication scheme for multi-server environments based on pairing and self-certified public keys. ...
Recently, Li et al. proposed a novel smart card and dynamic ID-based remote user authentication scheme for multi-server environments. ...
The proposed scheme In this section, we propose a novel dynamic ID-based and non-RC-dependent remote user authentication scheme for multi-server environments using pairing and self-certified public keys ...
doi:10.1371/journal.pone.0202657
fatcat:2pywnxh26fgntl772b4uc6cgeq
Identity-Based Fast Authentication Scheme for Smart Mobile Devices in Body Area Networks
2018
Wireless Communications and Mobile Computing
In this paper, we present a novel system named emergency medical system without the assistance of doctors. ...
When a personal computer collects information from these devices, it needs to authenticate the identity of them. Some effective schemes have been put forward to the device authentication in WBANs. ...
This attack uses a message that has been authenticated. If the scheme is not well designed, the old authentication message is likely to be used by malicious users to achieve their goals. ...
doi:10.1155/2018/4028196
fatcat:6jyuuar2rzaype2mv2tu72lyhe
Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks
2017
Security and Communication Networks
In this paper, we propose an efficient authenticated key agreement scheme for WBANs and add the key update phase to enhance the security of the proposed scheme. ...
Wireless body area networks (WBANs) are widely used in telemedicine, which can be utilized for real-time patients monitoring and home health-care. ...
There is a computable algorithm to get e( , ) for all , ∈ G 1 . As is shown in [22] , the modified Tate pairing on a supersingular elliptic curve is such a bilinear pairing. ...
doi:10.1155/2017/4167549
fatcat:35z7lzd4dna5dc2lrxk32loddi
An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment
[article]
2013
arXiv
pre-print
s multi-server authentication scheme which is based on pairing and self-certified public keys, and propose a novel dynamic ID based remote user authentication scheme for multi-server environments. ...
s multi-server authentication scheme and proposed a novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. ...
, we propose a novel dynamic ID based remote user authentication scheme for multi-server environment using pairing and self-certified public keys. ...
arXiv:1305.6350v1
fatcat:mrchtkxbrrc43k5wpkgjzzy6aq
A Secure and Effective Anonymous Integrity Checking Protocol for Data Storage in Multicloud
2015
Mathematical Problems in Engineering
Most of previous work focuses on three aspects, which are providing data dynamics, public verifiability, and privacy against verifiers with the help of a third party auditor. ...
In Section 3, a novel anonymous authentication protocol for remote verification user authentication scheme is proposed in multicloud storage. ...
Meanwhile, when a mobile user remotes into a foreign network, mutual authentication must first be solved to prevent illegal use from accessing services and to ensure that mobile users are connected to ...
doi:10.1155/2015/614375
fatcat:rcqwp6iyc5gv3or5gxfrcjzp6y
Anonymous Authentication for Secure Mobile Agent Based Internet Business
2016
Circuits and Systems
In such kind of Internet based applications, access must be secure and authentication takes a vital role to avoid malicious use of the system. ...
In this paper, we propose an anonymous authentication scheme which potentially reduces the overall computation time needed for verifying the legitimacy of the users. ...
Therefore, in this paper, we propose a new anonymous authentication scheme with privacy preserving during authentication based on bilinear pairing with less computational complexity. ...
doi:10.4236/cs.2016.78124
fatcat:iq25gqxdwvfc7axqajgiqw7jc4
A short anonymously revocable group signature scheme from decision linear assumption
2008
Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS '08
This identification is used for tracing a dishonest anonymous signer in case of an illegal act using the signature. However, P M can violate signers' anonymity. ...
In group signature schemes, a signature is anonymous for a verifier, while only a designated Privacy Manager (P M ) can identify the signer. ...
The DAA scheme is a variant of group signature scheme without P M , which is designed for the remote authentication of a Trusted Platform Module (TPM) while keeping user's privacy. ...
doi:10.1145/1368310.1368359
dblp:conf/ccs/NakanishiF08
fatcat:yjwuwj4w3rfsvkych6comstssu
An Efficient Integrity Verification and Authentication Scheme over the Remote Data in the Public Clouds for Mobile Users
2020
Security and Communication Networks
Firstly, a novel scheme is introduced to verify the integrity of the data stored in the remote cloud servers in the context of mobile users. ...
In this line, modern day researchers have proposed many novel schemes for ensuring the remote data integrity, but they suffer from attacks or overheads due to computation and communication. ...
Contributions of is Research Work (i) A novel scheme to verify the integrity of the remote data and to authenticate the mobile user during the integrity auditing process is introduced (ii) e presence of ...
doi:10.1155/2020/9809874
fatcat:24iczrzyabhmphcw277dbe4n4u
« Previous
Showing results 1 — 15 out of 711 results