Tian-Junfeng, Jiao-Hongqiang, Lijiang Ning, Liu Tao
{"title":"Double Secret Keys and Double Random Numbers Authentication Scheme","authors":"Tian-Junfeng, Jiao-Hongqiang, Lijiang Ning, Liu Tao","doi":"10.1109/CIS.WORKSHOPS.2007.73","DOIUrl":null,"url":null,"abstract":"This paper presents the mutual authentication scheme based on bilinear pairings with the deployment of smart card. We propose a novel technique of using double secret keys and double random numbers for preventing forgery attack in authentication process. It enhances the security of the authentication system and accomplishes the mutual authentication safely between user and remote system. Finally, we provide the validity attestation of the scheme and the analysis of its security and compute complexity.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.73","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
This paper presents the mutual authentication scheme based on bilinear pairings with the deployment of smart card. We propose a novel technique of using double secret keys and double random numbers for preventing forgery attack in authentication process. It enhances the security of the authentication system and accomplishes the mutual authentication safely between user and remote system. Finally, we provide the validity attestation of the scheme and the analysis of its security and compute complexity.