2020
DOI: 10.1016/j.comcom.2020.06.012
|View full text |Cite
|
Sign up to set email alerts
|

A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(15 citation statements)
references
References 48 publications
0
15
0
Order By: Relevance
“…Based on Rabin cryptosystem [19], Jiang et al [20] introduced a three-factor authentication protocol internet-integrated wireless sensor networks, which addresses the drawbacks of the twofactor mechanism. Another research proposed by Shuai et al [21] also employed the Rabin system to design a secure password-based authentication protocol with forward secrecy for industrial IoT (IIoT). Recently, Lin and Hsu [22] proposed an authenticated key agreement protocol for 5G-based telemedicine systems.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on Rabin cryptosystem [19], Jiang et al [20] introduced a three-factor authentication protocol internet-integrated wireless sensor networks, which addresses the drawbacks of the twofactor mechanism. Another research proposed by Shuai et al [21] also employed the Rabin system to design a secure password-based authentication protocol with forward secrecy for industrial IoT (IIoT). Recently, Lin and Hsu [22] proposed an authenticated key agreement protocol for 5G-based telemedicine systems.…”
Section: A Related Workmentioning
confidence: 99%
“…Our protocol employs Rabin cryptosystem for an efficient computation as its encryption operation (based on modular squaring operation) is much faster than the RSA cryptosystem [21]. š‘† 0 chooses two arbitrary large primes š‘ 0 , š‘ž 0 as server's private keys, then compute the corresponding public key š‘› 0 = š‘ 0 .…”
Section: A System Initializationmentioning
confidence: 99%
“…Rabin cryptosystem is an asymmetric encryption method, which relies on intractability of the integer factorization problem assumption (IFPA) [50,51]. The cryptosystem consists of three algorithms: key generation, encryption and decryption.…”
Section: A Rabin Cryptosystemmentioning
confidence: 99%
“…Given an arbitrary-length message and a hash function ā„Ž(. ), some characteristics of the function are described in the following definitions [51]. Definition 2: A fixed-size output = ā„Ž( ) should be produced.…”
Section: One-way Hash Functionmentioning
confidence: 99%
“…The proposed scheme is designed with Rabin cryptosystem, which relies on intractability of the integer factorization problem (IFP) [38,39]. The encryption speed is extremely fast since it is computed by modular squaring.…”
Section: ) System Initializationmentioning
confidence: 99%