4.4 Article

Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography

Journal

WIRELESS PERSONAL COMMUNICATIONS
Volume 81, Issue 1, Pages 53-75

Publisher

SPRINGER
DOI: 10.1007/s11277-014-2117-0

Keywords

Authentication; Key agreement; User anonymity; Elliptic curve; Smart card

Funding

  1. National Natural Science Foundation of China [61303237, 61272469, 61075063]
  2. Fundamental Research Funds for the Central Universities [2013199037]
  3. Wuhan Scientific Research Program [2013010501010144]
  4. China Postdoctoral Fund [2012194091]

Ask authors/readers for more resources

In order to provide secure remote access control, a robust and efficient authentication protocol should realize mutual authentication and session key agreement between clients and the remote server over public channels. Recently, Chun-Ta Li proposed a password authentication and user anonymity protocol by using smart cards, and they claimed that their protocol has satisfied all criteria required by remote authentication. However, we have found that his protocol cannot provide mutual authentication between clients and the remote server. To realize 'real' mutual authentication, we propose a two-factor remote authentication protocol based on elliptic curve cryptography in this paper, which not only satisfies the criteria but also bears low computational cost. Detailed analysis shows our proposed protocol is secure and more suitable for practical application.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.4
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available