Abstract
In 2006, Das et al. proposed a remote user authentication scheme using the properties of bilinear pairings. The current paper, however, demonstrates that Das et al.’s scheme is still vulnerable to an impersonation attack and an off-line password guessing attack. Furthermore, we present an improved authentication scheme based on bilinear computational Diffie-Hellman problem and one-way hash function to the schemes, in order to isolate such problems.
Chapter PDF
Similar content being viewed by others
References
Peyret, P., Lisimaque, G., Chua, T.Y.: Smart Cards Provide Very High Security and Flexibility in Subscribers Management. IEEE Transactions on Consumer Electronics 36(3), 744–752 (1990)
Sternglass, D.: The Future Is in the PC Cards. IEEE Spectrum 29(6), 46–50 (1992)
Joux, A.: A One Round Protocol for Tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol. 1838, pp. 385–394. Springer, Heidelberg (2000)
Boneh, D., Franklin, M.: Identity-based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Smart, N.P.: An Identity Based Authentication Key Agreement Protocol Based on Pairing. Electron. Lett. 38, 630–632 (2002)
Paterson, K.G.: ID-based Signature from Pairings on Elliptic Curves. Electron. Lett. 38(18), 1025–1026 (2002)
Wen, H.A., Lee, T.F., Hwang, T.: Provably Secure Three-party Password-based Authenticated Key Exchange Protocol Using Weil Pairing. IEE Proc.-Commun. 152(2), 138–143 (2005)
Das, M.L., et al.: A Novel Remote User Authentication Scheme Using Bilinear Pairings. Computers & Security 25(3), 184–189 (2006)
Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptograph. CRC Press, New York (1997)
Ding, Y., Horster, P.: Undetectable On-line Password Guessing Attacks. ACM Operating Systems Review 29(4), 77–86 (1995)
Menezes, A., Okamoto, T., Vanstone, S.: Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field. IEEE Transactions on Information Theory 39, 1639–1646 (1993)
Frey, G., Ruck, H.: A Remark Concerning m-divisibility and the Discrete Logarithm in the Divisor Class Group of Curves. Mathematics of Computation 62, 865–874 (1994)
Needham, R.M., Schroeder, M.D.: Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM 21(12), 993–999 (1978)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 IFIP International Federation for Information Processing
About this paper
Cite this paper
Yoon, EJ., Lee, WS., Yoo, KY. (2007). Secure Remote User Authentication Scheme Using Bilinear Pairings. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, JJ. (eds) Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems. WISTP 2007. Lecture Notes in Computer Science, vol 4462. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72354-7_9
Download citation
DOI: https://doi.org/10.1007/978-3-540-72354-7_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-72353-0
Online ISBN: 978-3-540-72354-7
eBook Packages: Computer ScienceComputer Science (R0)