Abstract
Considering the low-power computing capability of mobile devices, the security scheme design is a nontrivial challenge. The identity (ID)-based public-key system with bilinear pairings defined on elliptic curves offers a flexible approach to achieve simplifying the certificate management. In the past, many user authentication schemes with bilinear pairings have been proposed. In 2009, Goriparthi et al. also proposed a new user authentication scheme for mobile client-server environment. However, these schemes do not provide mutual authentication and key exchange between the client and the server that are necessary for mobile wireless networks. In this paper, we present a new user authentication and key exchange protocol using bilinear pairings for mobile client-server environment. As compared with the recently proposed pairing-based user authentication schemes, our protocol provides both mutual authentication and key exchange. Performance analysis is made to show that our presented protocol is well suited for mobile client-server environment. Security analysis is given to demonstrate that our proposed protocol is provably secure against previous attacks.
Original language | English |
---|---|
Pages (from-to) | 1520-1530 |
Number of pages | 11 |
Journal | Computer Networks |
Volume | 54 |
Issue number | 9 |
DOIs | |
Publication status | Published - 2010 Jun 17 |
Fingerprint
All Science Journal Classification (ASJC) codes
- Computer Networks and Communications
Cite this
}
An efficient user authentication and key exchange protocol for mobile client-server environment. / Wu, Tsu Yang; Tseng, Yuh Min.
In: Computer Networks, Vol. 54, No. 9, 17.06.2010, p. 1520-1530.Research output: Contribution to journal › Article
TY - JOUR
T1 - An efficient user authentication and key exchange protocol for mobile client-server environment
AU - Wu, Tsu Yang
AU - Tseng, Yuh Min
PY - 2010/6/17
Y1 - 2010/6/17
N2 - Considering the low-power computing capability of mobile devices, the security scheme design is a nontrivial challenge. The identity (ID)-based public-key system with bilinear pairings defined on elliptic curves offers a flexible approach to achieve simplifying the certificate management. In the past, many user authentication schemes with bilinear pairings have been proposed. In 2009, Goriparthi et al. also proposed a new user authentication scheme for mobile client-server environment. However, these schemes do not provide mutual authentication and key exchange between the client and the server that are necessary for mobile wireless networks. In this paper, we present a new user authentication and key exchange protocol using bilinear pairings for mobile client-server environment. As compared with the recently proposed pairing-based user authentication schemes, our protocol provides both mutual authentication and key exchange. Performance analysis is made to show that our presented protocol is well suited for mobile client-server environment. Security analysis is given to demonstrate that our proposed protocol is provably secure against previous attacks.
AB - Considering the low-power computing capability of mobile devices, the security scheme design is a nontrivial challenge. The identity (ID)-based public-key system with bilinear pairings defined on elliptic curves offers a flexible approach to achieve simplifying the certificate management. In the past, many user authentication schemes with bilinear pairings have been proposed. In 2009, Goriparthi et al. also proposed a new user authentication scheme for mobile client-server environment. However, these schemes do not provide mutual authentication and key exchange between the client and the server that are necessary for mobile wireless networks. In this paper, we present a new user authentication and key exchange protocol using bilinear pairings for mobile client-server environment. As compared with the recently proposed pairing-based user authentication schemes, our protocol provides both mutual authentication and key exchange. Performance analysis is made to show that our presented protocol is well suited for mobile client-server environment. Security analysis is given to demonstrate that our proposed protocol is provably secure against previous attacks.
UR - http://www.scopus.com/inward/record.url?scp=77955659710&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77955659710&partnerID=8YFLogxK
U2 - 10.1016/j.comnet.2009.12.008
DO - 10.1016/j.comnet.2009.12.008
M3 - Article
AN - SCOPUS:77955659710
VL - 54
SP - 1520
EP - 1530
JO - Computer Networks
JF - Computer Networks
SN - 1389-1286
IS - 9
ER -