2016
DOI: 10.1007/s11277-016-3781-z
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 27 publications
0
7
0
Order By: Relevance
“…The first section is based on an existing cryptographic techniques adopted from Wu et al's work [27]. The authentication phase includes system setup, key exchange, and authentication and key agreement.…”
Section: Membership Authentication and Verificationmentioning
confidence: 99%
See 2 more Smart Citations
“…The first section is based on an existing cryptographic techniques adopted from Wu et al's work [27]. The authentication phase includes system setup, key exchange, and authentication and key agreement.…”
Section: Membership Authentication and Verificationmentioning
confidence: 99%
“…This section describes the protocols necessary to setup a new user as a member into the system. Part of the formation of the protocol is adopted from Wu et al [27] regarding their research based on an efficient and secure identity-based authentication and key agreement protocol which guarantees user anonymity.…”
Section: User-issuer Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…As presented in Table II, two cryptographic functions are the most used, namely, 1) Bilinear pairings and 2) Elliptic curve cryptosystem (ECC). The authentication schemes [12], [29], [39], [38], [13], [72], [73] use the elliptic curve cryptosystem [80] to reduce the computation loads for mobile devices but they still suffer from some disadvantages such as the need for a key authentication center to maintain the certificates for users' public keys. Using ECC, the scheme [12] provides mutual authentication and supports a session key agreement between the user and the server.…”
Section: ) Cryptographic Functionsmentioning
confidence: 99%
“…Hu et al point out the privacy protection using images and identity information [3]. And some other researchers propose the identity based encryption [4][5][6][7][8][9][10]. Of which, the identity based encryption is a new tendency for identity authentication.…”
mentioning
confidence: 99%