Title | ||
---|---|---|
Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography |
Abstract | ||
---|---|---|
In order to provide secure remote access control, a robust and efficient authentication protocol should realize mutual authentication and session key agreement between clients and the remote server over public channels. Recently, Chun-Ta Li proposed a password authentication and user anonymity protocol by using smart cards, and they claimed that their protocol has satisfied all criteria required by remote authentication. However, we have found that his protocol cannot provide mutual authentication between clients and the remote server. To realize `real' mutual authentication, we propose a two-factor remote authentication protocol based on elliptic curve cryptography in this paper, which not only satisfies the criteria but also bears low computational cost. Detailed analysis shows our proposed protocol is secure and more suitable for practical application. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1007/s11277-014-2117-0 | Wireless Personal Communications: An International Journal |
Keywords | Field | DocType |
Authentication,Key agreement,User anonymity,Elliptic curve,Smart card | Lightweight Extensible Authentication Protocol,Mutual authentication,Challenge-Handshake Authentication Protocol,Computer science,Challenge–response authentication,Computer security,Otway–Rees protocol,Computer network,SSLIOP,Data Authentication Algorithm,Authentication protocol | Journal |
Volume | Issue | ISSN |
81 | 1 | 0929-6212 |
Citations | PageRank | References |
3 | 0.37 | 23 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Liping Zhang | 1 | 3 | 0.71 |
Shanyu Tang | 2 | 213 | 17.47 |
Jing Chen | 3 | 285 | 60.83 |
Shaohui Zhu | 4 | 56 | 3.06 |