skip to main content
10.1145/1516241.1516303acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

Bilinear-pairing-based remote user authentication schemes using smart cards

Published: 15 February 2009 Publication History

Abstract

This paper presents a detailed review of remote user authentication schemes with smart cards based on bilinear pairings. The first scheme regarding this was proposed by Manik et al. in 2006, which had been modified and improved later in several ways. Here, we analyze all the related proposed schemes, point out their weaknesses and flaws, and note down the sequence of improvements. After reviewing all the relevant schemes, we propose our scheme which is designed in such a way that it could ensure all sorts of facilities needed for remote user authentication procedure and could resist all types of known attacks. We present detailed validation, security, and performance analysis to prove the efficiency of our scheme.

References

[1]
Das, M. L., Saxena, A., Gulati, V. P., and Phatak, D. B. A Novel Remote User Authentication Scheme Using Bilinear Pairings, Computers and Security, Vol. 25, (2006) 184--189.
[2]
Frey, G. and Rück, H.-G. A Remark Concerning m-Divisibility and the Discrete Logarithm in the Divisor Class Group of Curves. Mathematics of Computation, Vol. 62, No. 206, (Apr. 1994), 865--874.
[3]
Menezes, A. J., Okamoto, T., and Vanstone, S. A. Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. on Inf. Theory, Vol. 39, Issue 5, (1993), 1639--1646.
[4]
Rhee, M. Y., Internet Security: Cryptographic Principles, Algorithms and Protocols, Wiley, 2003.
[5]
Chou, J.-S., Chen, Y., and Lin, J.-Y. Improvement of Manik et al.'s remote user authentication scheme. available at, http://eprint.iacr.org/2005/450.pdf
[6]
Thulasi, G., Das, M. L., Saxena, A. Cryptanalysis of recently proposed Remote User Authentication Schemes. available at, http://eprint.iacr.org/2006/028.pdf
[7]
Jeon, J.-C., Kang, B.-H., Kim, S.-M., Lee, W.-S., and Yoo, K.-Y. An Improvement of Remote User Authentication Scheme Using Smart Cards. LNCS 4325, (2006), 416--423.
[8]
Oh, J.-B., Jeon, J.-C., and Yoo, K.-Y. Further Improvement of Manik et al.'s Remote User Authentication Scheme Using Smart Cards. ISPA 2006, LNCS 4331, (2006), 57--64.
[9]
Jia, Z., Zhang, Y., Shao, H., Lin, Y., and Wang, J. A Remote User Authentication Scheme Using Bilinear Pairings and ECC. Proc. of ISDA'06, Vol. 2, 2006, 1091--1094.
[10]
Vo, D.-L. and Kim, K. Security Enhancement of a Remote User Authentication Scheme Using Bilinear Pairings and ECC. Proceedings of NPC'07, 2007, 144--147.
[11]
Yang, C., Ma, W., Huang, B., and Wang, X. Password-Based Access Control Scheme with Remote User Authentication Using Smart Cards. Proceedings of AINAW'07, Volume 2, 2007, 448--452.

Cited By

View all
  • (2024)Arithmetic optimization based secure intelligent clustering algorithm for Vehicular Adhoc NetworkPLOS ONE10.1371/journal.pone.030992019:9(e0309920)Online publication date: 12-Sep-2024
  • (2021)Secure transmission technique for data in IoT edge computing infrastructureComplex & Intelligent Systems10.1007/s40747-021-00576-78:5(3817-3832)Online publication date: 23-Nov-2021
  • (2021)A secure authentication technique for connecting different IoT devices in the smart city infrastructureCluster Computing10.1007/s10586-021-03444-825:4(2333-2349)Online publication date: 2-Nov-2021
  • Show More Cited By

Index Terms

  1. Bilinear-pairing-based remote user authentication schemes using smart cards

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ICUIMC '09: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
      February 2009
      704 pages
      ISBN:9781605584058
      DOI:10.1145/1516241
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 15 February 2009

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. authentication
      2. bilateral
      3. bilinear
      4. remote
      5. smart card

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      ICUIMC '09
      Sponsor:

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 13 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Arithmetic optimization based secure intelligent clustering algorithm for Vehicular Adhoc NetworkPLOS ONE10.1371/journal.pone.030992019:9(e0309920)Online publication date: 12-Sep-2024
      • (2021)Secure transmission technique for data in IoT edge computing infrastructureComplex & Intelligent Systems10.1007/s40747-021-00576-78:5(3817-3832)Online publication date: 23-Nov-2021
      • (2021)A secure authentication technique for connecting different IoT devices in the smart city infrastructureCluster Computing10.1007/s10586-021-03444-825:4(2333-2349)Online publication date: 2-Nov-2021
      • (2019)A provable and secure mobile user authentication scheme for mobile cloud computing servicesInternational Journal of Communication Systems10.1002/dac.398032:14Online publication date: 19-Jun-2019
      • (2017)An improved authentication protocol for distributed mobile cloud computing servicesInternational Journal of Critical Infrastructure Protection10.1016/j.ijcip.2017.10.00319:C(59-67)Online publication date: 1-Dec-2017
      • (2017)An ID-Based Anonymous Authentication Scheme for Distributed Mobile Cloud ComputingGeo-Spatial Knowledge and Intelligence10.1007/978-981-10-3969-0_44(401-409)Online publication date: 3-Mar-2017
      • (2015)A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing ServicesIEEE Systems Journal10.1109/JSYST.2014.23229739:3(805-815)Online publication date: Sep-2015

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media