scispace - formally typeset
Journal ArticleDOI

An efficient user authentication and key exchange protocol for mobile client-server environment

Tsu-Yang Wu, +1 more
- 01 Jun 2010 - 
- Vol. 54, Iss: 9, pp 1520-1530
TLDR
A new user authentication and key exchange protocol using bilinear pairings for mobile client-server environment is presented and it is demonstrated that the protocol is provably secure against previous attacks.
About
This article is published in Computer Networks.The article was published on 2010-06-01. It has received 90 citations till now. The article focuses on the topics: Mutual authentication & Authentication protocol.

read more

Citations
More filters
Journal ArticleDOI

Anonymous Authentication for Wireless Body Area Networks With Provable Security

TL;DR: A new anonymous authentication scheme for WBANs is proposed and it is proved that it is provably secure and overcomes the security weaknesses in previous schemes but also has the same computation costs at a client side.
Journal ArticleDOI

An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security

TL;DR: The proposed ID-based remote mutual authentication with key agreement scheme on ECC provides mutual authentication but also supports a session key agreement between the user and the server and gives a security proof under the random oracle.
Journal ArticleDOI

Security for 4G and 5G cellular networks

TL;DR: A comprehensive survey of authentication and privacy-preserving schemes for 4G and 5G cellular networks can be found in this paper, where the authors provide a taxonomy and comparison of authentication schemes in terms of tables.
Journal ArticleDOI

Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services

TL;DR: Security analysis shows that the proposed PAA scheme is able to address the serious security problems existing in Tsai and Lo's scheme and can meet security requirements for MCC services.
Journal ArticleDOI

Privacy-preserving data aggregation scheme against internal attackers in smart grids

TL;DR: An efficient and privacy-preserving DA scheme for the SG against internal attacks is proposed and shows that the proposed DA scheme not only overcome the key leakage problem in Fan et al.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI

A public key cryptosystem and a signature scheme based on discrete logarithms

TL;DR: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.
Book ChapterDOI

Identity-based cryptosystems and signature schemes

TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Proceedings ArticleDOI

Random oracles are practical: a paradigm for designing efficient protocols

TL;DR: It is argued that the random oracles model—where all parties have access to a public random oracle—provides a bridge between cryptographic theory and cryptographic practice, and yields protocols much more efficient than standard ones while retaining many of the advantages of provable security.
Related Papers (5)