A Novel Remote User Authentication Scheme from Bilinear Pairings Via Internet

AbstractRecently, Manik et al. proposed a remote user authentication scheme using bilinear pairings, in which the user can login to a remote system with his own smart card. Some security flaws and improvements of Manik et al.’s scheme were investigated and proposed by researchers. One of the most comprehensive studies of this type was conducted by Fang and Huang in the same year. Fang and Huang showed types of potential attacks on Manik et al.’s scheme and further proposed an improved scheme. In this paper, we demonstrated that both Manik et al.’s and the Fang–Huang schemes are vulnerable to a range of attacks to show the claimed security requirements cannot be achieved. Therefore, we proposed a novel remote user authentication scheme from bilinear pairings via Internet, which can withstand the types of attacks that would threaten the previous schemes. The proposed scheme not only enhances the security of the remote user authentication scheme but also achieves high levels of performance.

[1]  Wei-Chi Ku,et al.  Cryptanalysis of a Multi-Server Password Authenticated Key Agreement Scheme Using Smart Cards , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[2]  Yalin Chen,et al.  Improvement of Manik et al.¡¦s remote user authentication scheme , 2005, IACR Cryptol. ePrint Arch..

[3]  Chien-Lung Hsu Security of Chien et al.'s remote user authentication scheme using smart cards , 2004, Comput. Stand. Interfaces.

[4]  Hung-Yu Chien,et al.  An Efficient and Practical Solution to Remote Authentication: Smart Card , 2002, Comput. Secur..

[5]  Mukesh Singhal,et al.  A distributed multi-party key agreement protocol for dynamic collaborative groups using ECC , 2006, J. Parallel Distributed Comput..

[6]  Guanfei Fang,et al.  Improvement of recently proposed Remote User Authentication Schemes , 2006, IACR Cryptol. ePrint Arch..

[7]  Florian Hess,et al.  Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.

[8]  Kaijun Tan,et al.  Remote password authentication scheme based on cross-product , 1999, Comput. Commun..

[9]  Eun-Jun Yoon,et al.  Robust Remote User Authentication Scheme , 2004, ICOIN.

[10]  Walid I. Khedr SRFID: A hash-based security scheme for low cost RFID systems , 2013 .

[11]  Lee-Ming Cheng,et al.  Cryptanalysis of a Timestamp-Based Password Authentication Scheme , 2002, Comput. Secur..

[12]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[13]  Ashutosh Saxena,et al.  A novel remote user authentication scheme using bilinear pairings , 2006, Comput. Secur..

[14]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[15]  G. P. Biswas,et al.  A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem , 2011, J. Syst. Softw..

[16]  Chin-Chen Chang,et al.  Remote password authentication with smart cards , 1991 .

[17]  Wen-Shenq Juang,et al.  Efficient password authenticated key agreement using smart cards , 2004, Comput. Secur..

[18]  Kenneth G. Paterson,et al.  ID-based Signatures from Pairings on Elliptic Curves , 2002, IACR Cryptol. ePrint Arch..

[19]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[20]  Hung-Min Sun,et al.  On the Security of Some Proxy Blind Signature Schemes , 2005, ACSW.

[21]  Tzong-Chen Wu,et al.  Remote login authentication scheme based on a geometric approach , 1995, Comput. Commun..

[22]  Shiuh-Pyng Shieh,et al.  Password authentication schemes with smart cards , 1999, Comput. Secur..

[23]  Jia-Lun Tsai,et al.  Convertible multi-authenticated encryption scheme with one-way hash function , 2009, Comput. Commun..

[24]  Jiann-Fu Lin,et al.  A new electronic traveler's check scheme based on one-way hash function , 2007, Electron. Commer. Res. Appl..

[25]  Atul Negi,et al.  Cryptanalysis of recently proposed Remote User Authentication Schemes , 2006, IACR Cryptol. ePrint Arch..

[26]  Wang Shiuh-Jeng,et al.  Refereed paper: Smart card based secure password authentication scheme , 1996 .

[27]  Jianmin Wang,et al.  Efficient remote mutual authentication and key agreement , 2006, Comput. Secur..