{"title":"一种基于密码的移动环境认证与密钥建立方案","authors":"Jun Liu, J. Liao, Xiaomin Zhu","doi":"10.1109/AINAW.2007.42","DOIUrl":null,"url":null,"abstract":"We propose a cost-effective, use-convenient, and well-performing password-based authentication and key establishment scheme by means of IC (integrated circuit) card, RSA cryptography, and discrete logarithm. There doesn't exist any verification (password) table at the server side. To be applicable for the mobile environment, the scheme is designed as a one-roundtrip protocol to reduce the communication consumption over wireless channel. Moreover, the facts that users in this scheme are avoided downloading CRL (certificate revocation list) periodically and change the passwords in use without any interaction with servers over the radio are another two contributing factors to enhance the performance. Making use of queuing model M/G/l/N, we measure the performance of the scheme and compare it with TLS in terms of response time.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"A Password-Based Authentication and Key Establishment Scheme for Mobile Environment\",\"authors\":\"Jun Liu, J. Liao, Xiaomin Zhu\",\"doi\":\"10.1109/AINAW.2007.42\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We propose a cost-effective, use-convenient, and well-performing password-based authentication and key establishment scheme by means of IC (integrated circuit) card, RSA cryptography, and discrete logarithm. There doesn't exist any verification (password) table at the server side. To be applicable for the mobile environment, the scheme is designed as a one-roundtrip protocol to reduce the communication consumption over wireless channel. Moreover, the facts that users in this scheme are avoided downloading CRL (certificate revocation list) periodically and change the passwords in use without any interaction with servers over the radio are another two contributing factors to enhance the performance. Making use of queuing model M/G/l/N, we measure the performance of the scheme and compare it with TLS in terms of response time.\",\"PeriodicalId\":338799,\"journal\":{\"name\":\"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)\",\"volume\":\"174 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-05-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AINAW.2007.42\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AINAW.2007.42","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Password-Based Authentication and Key Establishment Scheme for Mobile Environment
We propose a cost-effective, use-convenient, and well-performing password-based authentication and key establishment scheme by means of IC (integrated circuit) card, RSA cryptography, and discrete logarithm. There doesn't exist any verification (password) table at the server side. To be applicable for the mobile environment, the scheme is designed as a one-roundtrip protocol to reduce the communication consumption over wireless channel. Moreover, the facts that users in this scheme are avoided downloading CRL (certificate revocation list) periodically and change the passwords in use without any interaction with servers over the radio are another two contributing factors to enhance the performance. Making use of queuing model M/G/l/N, we measure the performance of the scheme and compare it with TLS in terms of response time.