Paper Title:
Generalized Elliptic Curve Digital Signature Chain Based Authentication and Key Agreement Scheme
  Abstract

Recently, several one time password authentication schemes have been proposed. However, most one-time password authentication schemes have security flaws. In this paper, a novel one-time password authentication and key agreement scheme (EAKAS) based on elliptic curve digital signature chain is developed. The proposed scheme has the following merits password or verification table is not required in the server; users can choose or change password; it can resist off-line dictionary attacks and achieves mutual authentication; it has no system clock synchronization and no constraint of transmission delay; it can resist replay attacks, man-in-the-middle attack and insider attack; it is sensitive to password error and strong in security restoration; the session keys in proposed scheme have the feature of freshness, confidentiality, known key security and forward security. Compared with the related schemes, our proposed scheme has better security and well suited to scenarios requiring a high level security.

  Info
Periodical
Advanced Materials Research (Volumes 108-111)
Edited by
Yanwen Wu
Pages
1503-1508
DOI
10.4028/www.scientific.net/AMR.108-111.1503
Citation
L. H. Zhang, L. P. Zhang, E. F. Bai, "Generalized Elliptic Curve Digital Signature Chain Based Authentication and Key Agreement Scheme ", Advanced Materials Research, Vols. 108-111, pp. 1503-1508, 2010
Online since
May 2010
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Chao Jing
Micro-Electronic Packaging Technology and Equipment
Abstract:Increasing number of network applications require authentication of the user's identity which is the first step to ensure security. This...
1791
Authors: Yong Ning Guo, Cheng Lian Liu
Chapter 7: Computer Application in Design and Manufacturing (1)
Abstract:The Internet has been population, which it was implement information technology, to every enterprize, also changed their contact mode of...
3847
Authors: Young Hwa An
Abstract:In 2008, Bindu et al. proposed an improvement to Chien et al.'s remote password authentication scheme preserving user anonymity, and has...
184
Authors: Hui Liu
Chapter 10: Applied Computing and Information Technologies
Abstract:To access resources from a remote system, the user authentication is a very important security mechanism. Among remote authentication...
2182
Authors: Yung Cheng Lee, Pei Ju Lee
Chapter 5: Advanced Development for Information Technologies and Engineering, Networks and Software Applications, Data Acquisition and Processing, Intelligent Systems
Abstract:Due to the rapid growth of computer and communication technologies, people obtain variety of online services quickly. However, all networks...
858