首页 | 本学科首页   官方微博 | 高级检索  
     


Robust authentication and key agreement scheme preserving the privacy of secret key
Authors:Ren-Chiun Wang
Affiliation:a Department of Electrical Engineering, National Taiwan University, Taiwan
b Department of Information Management, National Kaohsiung First University of Science and Technology, Taiwan
Abstract:In ubiquitous computing environments, people may obtain their services from application servers by using mobile devices at any time and anywhere. For convenience, most of those devices are small and of limited power and computation capacity. In this paper, we propose a robust user authentication and key agreement scheme suitable for ubiquitous computing environments. The main merits include: (1) a security-sensitive verification table is not required in the server; (2) the password can be chosen and changed freely by the clients and cannot be derived by the privileged administrator of the server; (3) all well-known security threats are solved in our proposed scheme; (4) the scheme does not have a serious time-synchronization problem; (5) the client and the server can establish a common session key; (6) the scheme is practical and efficient; (7) the scheme can preserve the privacy of the client’s secret key even if the secret information stored in a smart card is compromised.
Keywords:Elliptic curve discrete logarithm problem   Java cryptography API   Password-based authenticated key agreement   Smart card
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号