2012
DOI: 10.1002/ett.2606
|View full text |Cite
|
Sign up to set email alerts
|

A novel anonymous authentication scheme without cryptography

Abstract: In this paper, we present a novel anonymous authentication scheme without employing any symmetric or asymmetric cryptosystem. The security of our scheme is guaranteed by the basic theories for solving linear equations, which can ensure it is unconditionally secure. The proposed scheme is adaptable for resource‐constrained devices or wireless networks well, because it only needs to perform several scalar multiplications instead of complex cryptographic operations and takes only one round of message exchange (ch… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 11 publications
(14 reference statements)
0
2
0
Order By: Relevance
“…A new method that provides authentication between server and users without using cryptography has been proposed in , although it is not suitable for sequential authentication and re‐authentication processes. Some studies are carried out on modified authentication protocols, whereas other studies are proposed major amendments to 3G‐WLAN or LTE‐WLAN interworking architectures to enhance authentication in the handover process, for example, method to provide security in WLAN networks , authentication protocol in Worldwide Interoperability for Microwave Access (WiMAX) networks , authentication and key agreement in WLAN‐LTE , authentication protocols for 3G‐WLAN interworking architectures , and .…”
Section: Introductionmentioning
confidence: 99%
“…A new method that provides authentication between server and users without using cryptography has been proposed in , although it is not suitable for sequential authentication and re‐authentication processes. Some studies are carried out on modified authentication protocols, whereas other studies are proposed major amendments to 3G‐WLAN or LTE‐WLAN interworking architectures to enhance authentication in the handover process, for example, method to provide security in WLAN networks , authentication protocol in Worldwide Interoperability for Microwave Access (WiMAX) networks , authentication and key agreement in WLAN‐LTE , authentication protocols for 3G‐WLAN interworking architectures , and .…”
Section: Introductionmentioning
confidence: 99%
“…anonymous authentication schemes have been proposed [15,18,21,22,24,25,28]. However, most existing schemes utilized classical cryptographic technologies.…”
mentioning
confidence: 99%