A secure user authentication protocol using elliptic curve cryptography

Abstract Authentication is a significant security prerequisite for secure communications. However, most of identity assisted mutual authentication protocols are requiring of security verification, which is extremely impartment for cryptographic approach. The proposed protocol is a better identity based mutual authentication framework for two users over secure communication network. Further, paper shows the security analysis and compares with other related protocols in secure communication.

[1]  Chunguang Ma,et al.  Comments on an Advanced Dynamic ID-Based Authentication Scheme for Cloud Computing , 2012, WISM.

[2]  Musheer Ahmad,et al.  A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS , 2019, Telematics Informatics.

[3]  Vinod Kumar,et al.  A Pairing-Free Identity Based Authentication Framework for Cloud Computing , 2013, NSS.

[4]  Yuming Feng,et al.  Security enhancement on an anonymous authentication scheme for wireless communications using smart cards , 2018, Journal of Discrete Mathematical Sciences and Cryptography.

[5]  Ramesh C. Poonia,et al.  A Literature Review on Dedicated Short Range Communication for Intelligent Transport , 2013 .

[6]  Pankaj Kumar,et al.  A Study of Pairing-Free Identity-Based Mutual Authenticated Protocol for Cloud Computing , 2017 .

[7]  Linesh Raja,et al.  Source Redundancy Management and Host Intrusion Detection in Wireless Sensor Networks , 2018 .

[8]  Linesh Raja,et al.  The Realistic Mobility Evaluation of Vehicular Ad-Hoc Network for Indian Automotive Networks , 2014 .

[9]  Vinod Kumar,et al.  An Identity-Based Authentication Framework for Big Data Security , 2019 .

[10]  Dheerendra Mishra,et al.  Efficient and secure two-factor dynamic ID-based password authentication scheme with provable security , 2018, Cryptologia.

[11]  Musheer Ahmad,et al.  An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach , 2019, Journal of King Saud University - Computer and Information Sciences.

[12]  Wei-Kuan Shih,et al.  An Advanced ECC Dynamic ID-Based Remote Mutual Authentication Scheme for Cloud Computing , 2011, 2011 Fifth FTRA International Conference on Multimedia and Ubiquitous Engineering.

[13]  Xuejie Zhang,et al.  Identity-Based Authentication in Cloud Storage Sharing , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[14]  Chin-Chen Chang,et al.  An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem , 2009, Comput. Secur..

[15]  Musheer Ahmad,et al.  An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing , 2018, Journal of Medical Systems.