Bilinear-pairing-based remote user authentication schemes using smart cards

This paper presents a detailed review of remote user authentication schemes with smart cards based on bilinear pairings. The first scheme regarding this was proposed by Manik et al. in 2006, which had been modified and improved later in several ways. Here, we analyze all the related proposed schemes, point out their weaknesses and flaws, and note down the sequence of improvements. After reviewing all the relevant schemes, we propose our scheme which is designed in such a way that it could ensure all sorts of facilities needed for remote user authentication procedure and could resist all types of known attacks. We present detailed validation, security, and performance analysis to prove the efficiency of our scheme.

[1]  Atul Negi,et al.  Cryptanalysis of recently proposed Remote User Authentication Schemes , 2006, IACR Cryptol. ePrint Arch..

[2]  Ashutosh Saxena,et al.  A novel remote user authentication scheme using bilinear pairings , 2006, Comput. Secur..

[3]  Yalin Chen,et al.  Improvement of Manik et al.¡¦s remote user authentication scheme , 2005, IACR Cryptol. ePrint Arch..

[4]  Man Young Rhee,et al.  Internet Security: Cryptographic Principles, Algorithms and Protocols , 2003 .

[5]  Kee-Young Yoo,et al.  Further Improvement of Manik et al.'s Remote User Authentication Scheme Using Smart Cards , 2006, ISPA Workshops.

[6]  Kee-Young Yoo,et al.  An Improvement of Remote User Authentication Scheme Using Smart Cards , 2006, MSN.

[7]  G. Frey,et al.  A remark concerning m -divisibility and the discrete logarithm in the divisor class group of curves , 1994 .

[8]  Kwangjo Kim,et al.  Security Enhancement of a Remote User Authentication Scheme Using Bilinear Pairings and ECC , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[9]  Chen Yang,et al.  Password-Based Access Control Scheme with Remote User Authentication Using Smart Cards , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[10]  Alfred Menezes,et al.  Reducing elliptic curve logarithms to logarithms in a finite field , 1991, STOC '91.

[11]  Jin Wang,et al.  A Remote User Authentication Scheme Using Bilinear Pairings and ECC , 2006, Sixth International Conference on Intelligent Systems Design and Applications.