2009
DOI: 10.1109/tvt.2009.2012389
|View full text |Cite
|
Sign up to set email alerts
|

Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 55 publications
(40 citation statements)
references
References 14 publications
0
40
0
Order By: Relevance
“…Section 5.2 makes comparisons based on computation and communication costs. Table 2 shows the computational time of public key operations under the same security level [43]. The notations TRSA-SIG-DEC, TRSA-VFY-ENC, TPAIR, and TECSM in Table 2 represent one RSA signing/decryption with a 1024-bit modulus, one RSA verification/encryption with a 1024-bit modulus, one admissible bilinear pairing, and one elliptic curve-based scalar multiplication as suggested by IEEE Standard P1363.3 [44], respectively.…”
Section: Discussionmentioning
confidence: 99%
“…Section 5.2 makes comparisons based on computation and communication costs. Table 2 shows the computational time of public key operations under the same security level [43]. The notations TRSA-SIG-DEC, TRSA-VFY-ENC, TPAIR, and TECSM in Table 2 represent one RSA signing/decryption with a 1024-bit modulus, one RSA verification/encryption with a 1024-bit modulus, one admissible bilinear pairing, and one elliptic curve-based scalar multiplication as suggested by IEEE Standard P1363.3 [44], respectively.…”
Section: Discussionmentioning
confidence: 99%
“…We discuss security properties of the above four aspects in these schemes respectively. The scheme in [27] only has the property nonrepudiation and unlinkability. In [19], only nonrepudiation property is satisfied.…”
Section: Unlinkabilitymentioning
confidence: 99%
“…A tree-based authentication scheme and suffers from a high amount of overhead on the non-signature packets. The new protocols discussed in [4], [5], [9], [10], [11], [18], [23], [26] for authenticating the mobile users and it enjoys better computation efficiency and security like [8], [12]. And also these schemes do not require long term secret keys on the server and not suited for the large power devices.…”
Section: Related Workmentioning
confidence: 99%
“…An enhanced key exchange protocol is proposed in [10], provides anonymous remote authentication. The scheme proposed in [9] differs from [21] in the way that provides authentication with the help of client account index, which helps to realize client anonymity with no encryption operations. An ID-based signature scheme is followed the Weil pairing algorithm and is secure if the Diffie-Hellman problem is hard.…”
Section: Related Workmentioning
confidence: 99%