Generalized Elliptic Curve Digital Signature Chain Based Authentication and Key Agreement Scheme


Article Preview

Recently, several one time password authentication schemes have been proposed. However, most one-time password authentication schemes have security flaws. In this paper, a novel one-time password authentication and key agreement scheme (EAKAS) based on elliptic curve digital signature chain is developed. The proposed scheme has the following merits password or verification table is not required in the server; users can choose or change password; it can resist off-line dictionary attacks and achieves mutual authentication; it has no system clock synchronization and no constraint of transmission delay; it can resist replay attacks, man-in-the-middle attack and insider attack; it is sensitive to password error and strong in security restoration; the session keys in proposed scheme have the feature of freshness, confidentiality, known key security and forward security. Compared with the related schemes, our proposed scheme has better security and well suited to scenarios requiring a high level security.



Advanced Materials Research (Volumes 108-111)

Edited by:

Yanwen Wu




L. H. Zhang et al., "Generalized Elliptic Curve Digital Signature Chain Based Authentication and Key Agreement Scheme ", Advanced Materials Research, Vols. 108-111, pp. 1503-1508, 2010

Online since:

May 2010




[1] N.M. Haller. The S/Key(TM) one-time password system[C]. Proceedings of the Internet Society Symposium on Network and Distributed System Security. San Diego, CA, USA: [s/n. ], (1994).

[2] N.M. Haller. The S/Key one- time password system[S]. RFC1760, (1995).

[3] M. Sandirigama, A. Shimizuand. Simple and secure password authentication protocol (SAS) [J]. IEICE Trans. Commun. 2000, E83-B (6): 1363-1365.

[4] C.L. Lin, H.M. Sun and Tzonelih Hwang. Attacks and solutions on strong-password authentication[J]. IEICE Trans. On Commun. 2001, E84-B(9): 2622-2627.

[5] T. Tsuji, T. Kamioka, and A. Shimizu. Simple and secure password authentication protocol, ver. 2(SAS-2)[R]. IEICE Technical Report, 2002, 102(314): 7 -11.

[6] T. T. Ng, S F. Chang, Q. Sun. Blind detection of photomontage using higher order statistics[R]. New York: Department of Electrical Engineering, Columbia University. (2004).

[7] S. Aifen, Y. X Yang, X.X. Niu, S. S . Luo. Research on the authenticated key agreement protocol based on elliptic curve cryptography[J]. Journal of Beijing University of Posts and Telecommunications, 2004, 27(3): 28-32.