Professional Documents
Culture Documents
Abstract
now
can
be
securely
and
efficiently
1. Introduction
function,
remote
password
authentication
2. Bilinear pairings
We briefly describe the basic definition and properties
of the bilinear pairing in this section. Let G1 be an
additive group of prime order q and G2 be a
multiplicative group of the same order q. We assume
that the discrete logarithm problem (DLP) in both G1
and G2 are hard. Typically, G1 will be a subgroup of the
group of points on an elliptic curve over a finite field, G2
Ppub = sP
(1)
following conditions:
Registration Phase:
center
generates
the
authentication
parameters for the user and stores them into the smart
card of the user by performing the following steps on
curve E:
1. Compute the public key of the user i from
Qi = H1(idi)
(2)
*
(3)
H1(), h(), Xi} and issue the card to the user i, here h()
user i
Fig. 1
Registration Phase
Login Phase:
user. In the login phase, the user attaches his smart card
(4)
(5)
user i
keys in his identity idi* and his password pwi*. Then the
Remote System
1. user i host : m1 = { id i , T , Ai , Bi }
Ai = rPi
*
Bi = h (T )( pwi Qi X i ) + rQi
Fig. 2
Authentication Phase:
Login Phase
(6)
H1 (idi*).
Qi*
aborted.
Ai = rP
Ci = n(pwi*QiXi) + rQi
(7)
(8)
scheme
consists
of
three
phases:
user i
3
*
1. user i host : id i
2. host user i : n
3. user i host : m2 = { Ai , Ci }
Ai = rP
*
Ci = n( pwi Qi X i ) + rQi
Fig. 3
6. Conclusions
We have proposed an ECC pairing-wise, user-friendly
References
[1] Dan Boneh, Matthew Franklin, Identity-Based Encryption
from the Weil Pairing, Advances in Cryptology
CRYPTO 2001, Springer- Verlag, pp. 312-229, 2001
[2] C. C. Chang and S. J. Hwang, Using smart cards to
authenticate remote passwords, Computers and
Mathematical Applications, Vol.26, No.7, pp.19-27, 1993
[3] C. C. Chang and T. C. Wu, Remote password
authentication with smart cards, IEE Proceeding-E,
Vol.138, No.3, pp.165-168, 1991
[4] Hung-Yu Chien, Jinn-Ke Jan and Yuh-Min Tseng, An
efficient and practical solution to remote authentication:
smart card, Computer & Security, Vol.21, No.4,
pp.372-375, 2002
[5] Steven D. Galbraith, Keith Harrison and David Soldera,
Implementing the Tate Pairing, Proceedings of the 5th
International Symposium on Algorithmic Number Theory,
ANTS-V, Sydney, Australia, pp. 324-337, July 7-12, 2002
[6] Min-Shiang Hwang and Li-Hua Li, A new remote user
authentication scheme using cards, IEEE Trans. on
Consumer Electronics, Vol.46, February, pp.28-30, 2000
[7] L. Lamport, Password authentication with insecure
communication, Communications of ACM, Vol.24,
pp.770-772, 1981
[8] Cheng-Chi Lee, Min-Shiang Hwang, and Wei-Pang Yang,
A Flexible Remote Authentication Scheme Using Smart
Cards, ACM Operating Systems Review, Vol.36, No.3, pp.
46-52, 2002
[9] E. Okamoto, and K. Tanka, Identity-based information
security managements system for personal computer
networks, IEEE Journal on Selected Areas in
Communications, Vol.7, No.2, 1989, pp. 290-294
[10] Hung-Min Sun, An efficient remote use authentication
scheme using smart card, IEEE trans. on Consumer