Robust two-factor authentication and key agreement preserving user privacy

被引:0
|
作者
Jiang, Qi [1 ]
Ma, Jianfeng [2 ]
Li, Guangsong [3 ]
Yang, Li [1 ]
机构
[1] School of Computer Science and Technology, Xidian University, No.2 South Taibai Road, Xi'an, Shaanxi, 710071, China
[2] Science and Technology on Communication Information Security Control Laboratory, 36 Research Institute CETC, Jiaxing, 314033, China
[3] Department of Information Research, Zhengzhou Information Science and Technology Institute, No.5 Wenhua Road, Zhengzhou, Henan, 450002, China
关键词
Smart cards;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:229 / 240
相关论文
共 50 条
  • [1] User-centric Two-factor Authentication Key Agreement Protocol
    Yang, Xue
    Liu, Yi-Jing
    Jiang, Qi
    Wang, Jin-Hua
    Li, Xing-Hua
    Ruan Jian Xue Bao/Journal of Software, 2024, 35 (10): : 4859 - 4875
  • [2] A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme
    Chandrakar, Preeti
    Om, Hari
    INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2016, 12 (02) : 62 - 79
  • [3] Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol
    Xie, Qi
    Dong, Na
    Wong, Duncan S.
    Hu, Bin
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (03) : 478 - 487
  • [4] Robust authentication and key agreement scheme preserving the privacy of secret key
    Wang, Ren-Chiun
    Juang, Wen-Shenq
    Lei, Chin-Laung
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 274 - 280
  • [5] Privacy-Preserving Two-Factor Key Agreement Protocol Based on Chebyshev Polynomials
    Tan, Zuowen
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [6] Two-Factor User Authentication with Key Agreement Scheme Based on Elliptic Curve Cryptosystem
    Qu, Juan
    Tan, Xiao-Ling
    JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2014, 2014
  • [7] Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
    Wang, Ding
    Wang, Nan
    Wang, Ping
    Qing, Sihan
    INFORMATION SCIENCES, 2015, 321 : 162 - 178
  • [8] A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes
    Lu Zhou
    Chunpeng Ge
    Chunhua Su
    Science China Information Sciences, 2020, 63
  • [9] Lightweight two-factor authentication framework with privacy preserving for smart eHealth
    Rao, Patruni Muralidhara
    Deebak, B. D.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (01) : 373 - 396
  • [10] A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes
    Lu ZHOU
    Chunpeng GE
    Chunhua SU
    ScienceChina(InformationSciences), 2020, 63 (03) : 34 - 48