Advertisement

Novel Remote User Authentication Scheme Using Bilinear Pairings

  • Chen Yang
  • Wenping Ma
  • Xinmei Wang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4610)

Abstract

This paper presents a novel password-based remote user authentication scheme using bilinear pairings by introducing the concept of private key proxy quantity. In the proposed scheme, an authorized user is allowed to login to the remote system if and only if the login request is verified. And by assigning each user his corresponding private key proxy quantity, the collusion-resistance security of the proposed scheme is enhanced. The scheme provides a flexible password change strategy and eliminates the need of the password table. In addition, the proposed scheme can efficiently resist message replaying attack, forgery attack, Masquerade attack, guessing and stolen verifier attack and collusion attack.

Keywords

Smart Card Authentication Scheme Replay Attack Bilinear Pairing Collusion Attack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Lamport, L.: Password Authentication within Secure Communication. Communications of ACM 24(11), 770–772 (1981)CrossRefMathSciNetGoogle Scholar
  2. 2.
    Lee, C.C., Li, L.H., Hwang, M.S.: A Remote User Authentication Scheme Using Hash Functions. ACM Operating Systems Review 36(4), 23–29 (2002)CrossRefGoogle Scholar
  3. 3.
    Ku, W.C.: A Hash-based Strong-password Authentication Scheme without Using Smart Cards. ACM Operation Systems Review 38(1), 29–34 (2004)CrossRefGoogle Scholar
  4. 4.
    Hwang, M.S., Li, L.H.: A New Remote User Authentication Scheme Using Smart Card. IEEE Trans. on Consumer Electronics 46(1), 28–30 (2000)CrossRefGoogle Scholar
  5. 5.
    Shen, J.J., Lin, C.W., Hwang, M.S.: A Modified Remote User Authentication Scheme Using Smart Cards. IEEE Trans. on Consumer Electronics 49(2), 414–416 (2003)CrossRefGoogle Scholar
  6. 6.
    Amit, K., Sunder, L.: A Remote User Authentication Scheme Using Smart Cards with Forward Secrecy. IEEE Trans. on Consumer Electronics 49(4), 1246–1248 (2003)CrossRefGoogle Scholar
  7. 7.
    Wu, S.T., Chieu, B.C.: A User Friendly Remote Authentication Scheme with Smart Cards. Computers & Security 22(6), 547–550 (2003)CrossRefGoogle Scholar
  8. 8.
    Yoon, E.J., Ryu, E.K., Yoo, K.Y.: Efficient Remote User Authentication Scheme based on Generalized ElGamal Signature Scheme. IEEE Trans. on Consumer Electronics 50(2), 568–570 (2004)CrossRefGoogle Scholar
  9. 9.
    Boneh, D., Franklin, M.: Identity-based Encryption from the Weil Pairing, 2001. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  10. 10.
    Das, M.L., Ashutosh, S., Gulati, V.P., Phatak, D.B.: A Novel Remote User Authentication Scheme Using Bilinear Pairings. Computer & Security 25, 184–189 (2006)CrossRefGoogle Scholar
  11. 11.
    Chou, J.S., Chen, Y., Lin, J.Y.: Improvement of Manik et al.’s Remote User Authentication Scheme. http://eprint.iacr.org/2005/450.pdf
  12. 12.
    Thulasi, G., Das, M.L., Ashutosh, S.: Cryptoanalysis of Recently Proposed Remote User Authentication Scheme. http://eprint.iacr.org/2006/028.pdf
  13. 13.
    Fang,G., Huang,G.: Improved of Recently Proposed Remote User Authentication Schemes. http://eprint.iacr.org/2006/200.pdf

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Chen Yang
    • 1
  • Wenping Ma
    • 1
  • Xinmei Wang
    • 1
  1. 1.Ministry of Education Key Lab. of Computer Networks and Information Security, Xidian University, Xi’an 710071China

Personalised recommendations