2014
DOI: 10.5755/j01.itc.43.4.6579
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Password Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography

Abstract: Recently, Li proposed a new password authentication and user anonymity scheme based on elliptic curve cryptography. In this paper, we will show that Li's scheme is vulnerable to the impersonation attack and the denial of service attack. Moreover, we also point out that there is an error in his scheme. To overcome the weaknesses of Li's scheme, we proposed an efficient password authentication scheme based on elliptic curve cryptography. The proposed scheme improves the security and efficiency of the authenticat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
13
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(13 citation statements)
references
References 17 publications
(16 reference statements)
0
13
0
Order By: Relevance
“…It may be noted that the proposed protocol is secure against various relevant security attacks and achieves several security attributes than other protocols. In Table 3, we summarized the communication cost, computation cost and storage cost of our proposed protocol and other relevant protocol [11,12,13,14]. The total communication cost of our proposed scheme and other relevant scheme [11,12,13,14] are 160*4+512*2=1664, 160*7=1120, 160*5+512=1312, 4*160+1024=1664 and 4*160+1024*2=2688 bits respectively.…”
Section: Performance Comparisonmentioning
confidence: 95%
See 4 more Smart Citations
“…It may be noted that the proposed protocol is secure against various relevant security attacks and achieves several security attributes than other protocols. In Table 3, we summarized the communication cost, computation cost and storage cost of our proposed protocol and other relevant protocol [11,12,13,14]. The total communication cost of our proposed scheme and other relevant scheme [11,12,13,14] are 160*4+512*2=1664, 160*7=1120, 160*5+512=1312, 4*160+1024=1664 and 4*160+1024*2=2688 bits respectively.…”
Section: Performance Comparisonmentioning
confidence: 95%
“…In Table 3, we summarized the communication cost, computation cost and storage cost of our proposed protocol and other relevant protocol [11,12,13,14]. The total communication cost of our proposed scheme and other relevant scheme [11,12,13,14] are 160*4+512*2=1664, 160*7=1120, 160*5+512=1312, 4*160+1024=1664 and 4*160+1024*2=2688 bits respectively. Next, we will compare the memory requirements to store security parameters in the smartcard of the proposed scheme with some other relevant schemes [11,12,13,14].…”
Section: Performance Comparisonmentioning
confidence: 95%
See 3 more Smart Citations