4.5 Article

Remote user authentication and key agreement for mobile client-server environments on elliptic curve cryptography

Journal

JOURNAL OF SUPERCOMPUTING
Volume 74, Issue 11, Pages 5927-5943

Publisher

SPRINGER
DOI: 10.1007/s11227-018-2507-2

Keywords

Mutual authentication; Key agreement; ECC; User anonymity; Random oracle model

Funding

  1. Science and Technology Innovation Guidance Project 2017 of the Zhaoqing Science and Technology Bureau [201704030605]

Ask authors/readers for more resources

In recent years, with the rapid advance of wireless mobile networks, secure and efficient authentication mechanisms that can operate over insecure wireless channels have become increasingly essential. To improve the efficiency in the energy-limited mobile devices, many authentication schemes using elliptic curve cryptography (ECC) have been presented. However, these schemes are still inefficient in terms of computation cost and communication overhead. Moreover, they suffer from various attacks, making them impractical due to their inherent design. To address their weaknesses, we propose a more efficient ID-based authentication scheme on ECC for mobile client-server environments with considering security requirements. The proposed scheme not only provides mutual authentication but also achieves session key agreement between the client and the server. Through a rigorous formal security proof under random oracle model, it has been indicated that the proposed protocol is secure against security threats. The informal security analysis shows that our scheme can resist well-known attacks and provides user anonymity. Performance analysis and comparison results demonstrate that our scheme outperforms the related competitive works and is more suitable for practical application in mobile client-server environments.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available