2020
DOI: 10.3390/app10228291
|View full text |Cite
|
Sign up to set email alerts
|

Elliptic Curve Signcryption-Based Mutual Authentication Protocol for Smart Cards

Abstract: In the modern computing environment, smart cards are being used extensively, which are intended to authenticate a user with the system or server. Owing to the constrictions of computational resources, smart card-based systems require an effective design and efficient security scheme. In this paper, a smart card authentication protocol based on the concept of elliptic curve signcryption has been proposed and developed, which provides security attributes, including confidentiality of messages, non-repudiation, t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 54 publications
0
3
0
Order By: Relevance
“…Then they proposed an efficient remote mutual authentication scheme using ECC and Fuzzy Extractor. Also, Singh et al [ 32 ] proposed an elliptic curve signcryption-based mutual authentication protocol. It greatly reduced the computing cost and communication overhead of smart card.…”
Section: Related Workmentioning
confidence: 99%
“…Then they proposed an efficient remote mutual authentication scheme using ECC and Fuzzy Extractor. Also, Singh et al [ 32 ] proposed an elliptic curve signcryption-based mutual authentication protocol. It greatly reduced the computing cost and communication overhead of smart card.…”
Section: Related Workmentioning
confidence: 99%
“…The elliptic curve cryptosystem, or ECC, provides most of the significant features when compared with other public key algorithms [22]. With fewer mathematics, small key length, and less storage space, the ECC presents an adequate level of data security.…”
Section: Elliptic Curve Cryptosystem (Ecc)mentioning
confidence: 99%
“…3GPP has not adopted any new scheme to address the above issue in 4G. However, recently an Elliptic Curve Integrated Encryption Scheme (ECIES) 13 is introduced by 3GPP to tackle the issue of identity privacy in 5G mobile network (3GPP TS 33.501) 14 . Unlike most of the earlier schemes, this scheme succeeds in concealing the permanent identity of the subscriber through the use of elliptic curve cryptography.…”
Section: Introductionmentioning
confidence: 99%