Remote user authentication and key agreement for mobile client–server environments on elliptic curve cryptography

被引:0
|
作者
Jiaqing Mo
Zhongwang Hu
Yuhua Lin
机构
[1] Zhaoqing University,School of Computer Science and Software
[2] Zhaoqing University,Education Technology and Computer Center
来源
The Journal of Supercomputing | 2018年 / 74卷
关键词
Mutual authentication; Key agreement; ECC; User anonymity; Random oracle model;
D O I
暂无
中图分类号
学科分类号
摘要
In recent years, with the rapid advance of wireless mobile networks, secure and efficient authentication mechanisms that can operate over insecure wireless channels have become increasingly essential. To improve the efficiency in the energy-limited mobile devices, many authentication schemes using elliptic curve cryptography (ECC) have been presented. However, these schemes are still inefficient in terms of computation cost and communication overhead. Moreover, they suffer from various attacks, making them impractical due to their inherent design. To address their weaknesses, we propose a more efficient ID-based authentication scheme on ECC for mobile client–server environments with considering security requirements. The proposed scheme not only provides mutual authentication but also achieves session key agreement between the client and the server. Through a rigorous formal security proof under random oracle model, it has been indicated that the proposed protocol is secure against security threats. The informal security analysis shows that our scheme can resist well-known attacks and provides user anonymity. Performance analysis and comparison results demonstrate that our scheme outperforms the related competitive works and is more suitable for practical application in mobile client–server environments.
引用
收藏
页码:5927 / 5943
页数:16
相关论文
共 50 条
  • [21] An efficient user authentication and key exchange protocol for mobile client-server environment
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    COMPUTER NETWORKS, 2010, 54 (09) : 1520 - 1530
  • [22] Implementation of Elliptic Curve Cryptography over a Server-Client network
    Gowda, Bore S. B.
    2020 5TH INTERNATIONAL CONFERENCE ON DEVICES, CIRCUITS AND SYSTEMS (ICDCS' 20), 2020, : 116 - 119
  • [23] Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography
    Zhang, Liping
    Tang, Shanyu
    Chen, Jing
    Zhu, Shaohui
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 81 (01) : 53 - 75
  • [24] Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography
    Liping Zhang
    Shanyu Tang
    Jing Chen
    Shaohui Zhu
    Wireless Personal Communications, 2015, 81 : 53 - 75
  • [25] An Improved Three-Factor Remote User Authentication Protocol Using Elliptic Curve Cryptography
    Liu, Wan-Rong
    Li, Bin
    Ji, Zhi-Yong
    International Journal of Network Security, 2022, 24 (03) : 521 - 532
  • [26] A secure user authentication protocol using elliptic curve cryptography
    Kumari, Adesh
    Abbasi, M. Yahya
    Kumar, Vinod
    Khan, Akber Ali
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04): : 521 - 530
  • [27] A secure remote password authentication scheme with key agreement for multi-server environments
    Lee, Wei-Bin
    Wu, Chia-Chun
    Tsaur, Woei-Jiunn
    WMSCI 2005: 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol 5, 2005, : 19 - 23
  • [28] Lightweight Authentication and Key Management on 802.11 with Elliptic Curve Cryptography
    Namal, Suneth
    Georgantas, Konstantinos
    Gurtov, Andrei
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1830 - 1835
  • [29] An improved authentication key agreement protocol based on elliptic curve for wireless mobile networks
    Chang, Chin-Chen
    Chang, Shih-Chang
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1375 - 1378
  • [30] A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography
    Chen, Yulei
    Chen, Jianhua
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (11) : 16009 - 16032