Zero-knowledge Based User Remote Authentication Over Elliptic Curve


KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 12, pp. 517-524, Dec. 2013
10.3745/KTCCS.2013.2.12.517,   PDF Download:

Abstract

Although password-based authentication as known as knowledge-based authentication was commonly used but intrinsic problems such as dictionary attack remain unsolved. For that the study on possession-based authentication was required. User remote authentication using smartcard is proceeding actively since Lee et al. proposed user remote authentication using knowledge-based information(password) and possession-base information(smartcard) in 2002. in 2009, Xu et al. proposed a new protocol preserving user anonymity and Shin et al. proposed enhanced scheme with analysis of its vulnerabilities on user anonymity and masquerading attack in 2012. In this paper, we analyze Shin et al. scheme on forward secrecy and insider attack and present novel user authentication based on elliptic curve cryptosystem which is secure against forward secrecy, insider attack, user anonymity and masquerading attack.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
J. S. Choi and H. W. Kim, "Zero-knowledge Based User Remote Authentication Over Elliptic Curve," KIPS Transactions on Computer and Communication Systems, vol. 2, no. 12, pp. 517-524, 2013. DOI: 10.3745/KTCCS.2013.2.12.517.

[ACM Style]
Jong Seok Choi and Ho Won Kim. 2013. Zero-knowledge Based User Remote Authentication Over Elliptic Curve. KIPS Transactions on Computer and Communication Systems, 2, 12, (2013), 517-524. DOI: 10.3745/KTCCS.2013.2.12.517.