Computer Science ›› 2023, Vol. 50 ›› Issue (8): 359-364.doi: 10.11896/jsjkx.220700151
• Information Security • Previous Articles Next Articles
LIU Yingjun1, LUO Yang2, YANG Yujun2, LIU Yuanni3
CLC Number:
[1]HAASE B,LABRIQUE B.AuCPace:Efficient verifier-basedPAKE protocol tailored for the IIoT[J].IACR Transactions on Cryptographic Hardware and Embedded Systems,2019(2):1-48. [2]BELLOVIN S M,MERRITT M.Encrypted key exchange:password-based protocols secure against dictionary attacks[C]//Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.Oakland,CA,USA,1992:72-84. [3]LI X,NIU J,KHAN M K,et al.An enhanced smart card based remote user password authentication scheme[J].Journal of Network and Computer Applications,2013,36(5):1365-1371. [4]KUMARI S,KHAN M K,LI X,et al.Design of a user anonymous password authentication scheme without smart card[J].International Journal of Communication Systems,2016,29(3):441-458. [5]SHEN J,FENG M,LIU D,et al.Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing[C]//International Conference on Information Security Practice and Experience.Cham:Springer,2017:454-467. [6]SHU J,XU C X.Efficient Password-Based Authenticated KeyExchange Protocol under Standard Model[J].Journal of Electronics & Information Technology,2009,31(11):2716-2719. [7]JIANG Q,MA J,LI G,et al.Improvement of robust smart-card-based password authentication scheme[J].International Journal of Communication Systems,2015,28(2):383-393. [8]JIANG Q,MA J,TIAN Y.Cryptanalysis of smart-card-basedpassword authenticated key agreement protocol for session initia-tion protocol of Zhang et al[J].International Journal of Communication Systems,2015,28(7):1340-1351. [9]WEI F,VIJAYAKUMAR P,SHEN J,et al.A provably secure password-based anonymous authentication scheme for wireless body area networks[J].Computers & Electrical Engineering,2018,65:322-331. [10]WANG C,XU G,LI W.A secure and anonymous two-factor authentication protocol in multiserver environment[J].Security and CommunicationNetworks,2018,2018:1-15. [11]BANERJEE S,ODELU V,DAS A K,et al.A provably secure and lightweight anonymous user authenticated session key exchange scheme for Internet of Things deployment[J].IEEE Internet of Things Journal,2019,6(5):8739-8752. [12]VIET D Q,YAMAMURA A,TANAKA H.Anonymous password-based authenticated key exchange[C]//International Conference on Cryptology in India.Berlin:Springer,2005:244-257. [13]YANG J,ZHANG Z.A new anonymous password-based au-thenticated key exchange protocol[C]//International Confe-rence on Cryptology in India.Berlin:Springer,2008:200-212. [14]LIU F F,LIU Y B.Lightweight smart phone security authentication protocol based on social network[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2013,25(1):132-137. [15]YANG Y,ZHOU J,WENG J,et al.A new approach for anonymous password authentication[C]//2009 Annual Computer Security Applications Conference.IEEE,2009:199-208. [16]QIAN H,GONG J,ZHOU Y.Anonymous password-based key exchange with low resources consumption and better user-friendliness[J].Security and Communication Networks,2012,5(12):1379-1393. [17]HU X,ZHANG J,ZHANG Z,et al.Anonymous password authenticated key exchange protocol in the standard model[J].Wireless Personal Communications,2017,96(1):1451-1474. [18]JIANG Q,MA J,WEI F,et al.An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks[J].Journal of Network and Computer Applications,2016,76:37-48. [19]ZHANG Y,XIANG Y,WU W,et al.A variant of password authenticated key exchange protocol[J].Future Generation Computer Systems,2018,78:699-711. [20]CHEN Y,YUAN J,ZHANG Y.An improved password-authenticated key exchange protocol for VANET[J].Vehicular Communications,2021,27:100286. [21]CHANG C C,LE H D.A provably secure,efficient,and flexible authentication scheme for ad hoc wireless sensor networks[J].IEEE Transactions on wireless communications,2015,15(1):357-366. [22]HE J,YANG Z,ZHANG J,et al.On the security ofa provably secure,efficient,and flexible authentication scheme for ad hoc wireless sensor networks[J].International Journal of Distributed Sensor Networks,2018,14(1):1-11. [23]JIANG Q,MA J,YANG C,et al.Efficient end-to-end authentication protocol forwearable health monitoring systems[J].Computers & Electrical Engineering,2017,63:182-195. [24]ZHAO Z Q,GUO X J,YIN M H,et al.Research on authentication method of identity-based higncryption in IoT[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2023,35(2):343-351. [25]LIU C H,CHUNG Y F.Secure user authentication scheme for wireless healthcare sensor networks[J].Computers & Electrical Engineering,2017,59:250-261. [26]LI C T,WU T Y,CHEN C L,et al.An efficient user authentication and user anonymity scheme with provably security for IoT-based medical care system[J].Sensors,2017,17(7):1482. [27]BELLARE M,POINTCHEVAL D,ROGAWAY P.Authenticated key exchange secure against dictionary attacks[C]//International Conference on the Theory and Applications of Cryptographic Techniques.Berlin:Springer,2000:139-155. [28]LI Z P,WANG D.Achieving one-round password-based authenticated key exchange over lattices[J].IEEE Transactions on Services Computing,2019,15(1):308-321. [29]YU J X,LIAN H H,ZHAO Z Q,et al.Provably secure verifier-based password authenticated key exchange based on lattices[M]//Advances in Computers.Elsevier,2021:121-156. [30]XIANG S B,XU B,CHEN K.A two-party password-authenti-cated key exchange protocol with verifier[J].Journal of Compu-ter and Communications,2021,9(4):102. [31]SHIN S H,KOBARA K.Simple anonymous password-based authenticated key exchange(sapake),reconsidered[J].IEIC Transactions on Fundamentals of Electronics,Communications and Computer Sciences,2017,100(2):639-652. |
[1] | GUO Nan, SONG Xiaobo, ZHUANG Luyuan, ZHAO Cong. Anonymous Batch Authentication Scheme in Internet of Vehicles for WAVE Security Services [J]. Computer Science, 2023, 50(4): 308-316. |
[2] | SHI Yu-qing, LING Jie. Online/Offline Attribute-based Encryption with User and Attribute Authority Accountability [J]. Computer Science, 2020, 47(4): 292-297. |
[3] | WANG Qing-long, QIAO Rui, DUAN Zong-tao. Security Analysis on VANETs Authentication Schemes:CPAV and ABV [J]. Computer Science, 2019, 46(4): 177-182. |
[4] | YUE Xiao-han, HUI Ming-heng, WANG Xi-bo. Forward Security Anonymous Authentication Protocol Based on Group Signature for Vehicular Ad Hoc Network [J]. Computer Science, 2018, 45(11A): 382-388. |
[5] | CHEN Hai-hong. Three-party Authenticated Key Agreement Protocol Based on One-way Isomorphism [J]. Computer Science, 2015, 42(Z6): 447-450. |
[6] | CHEN Jian, WANG Xiao-ying, WANG Yong-tao and LI Yao-sen. Efficient Attribute Based Key Agreement Protocol [J]. Computer Science, 2015, 42(Z6): 444-446. |
[7] | REN Yan. Attribute-based Signatures with Auditabiling in Standard Model [J]. Computer Science, 2015, 42(2): 142-146. |
[8] | FANG Li-ming, HUANG Zhi-qiu and WANG Jian-dong. Secure Channel Free Searchable Encryption in Standard Model [J]. Computer Science, 2015, 42(11): 197-202. |
[9] | XU Jun-feng,DING Xue-feng,SI Cheng-xiang and ZHANG Wei. Certificateless Anonymous Authentication Protocol for Vehicle Ad-hoc Network [J]. Computer Science, 2013, 40(9): 152-155. |
[10] | WANG Yong-tao,FENG Wei-duan,LIU Xiao-nan,SONG Jing and GUO Zhen-zhou. Message Policy Attribute Based Key Agreement Protocol [J]. Computer Science, 2013, 40(9): 106-110. |
[11] | MING Yang and LI Rui. Efficient Identity-based Sanitizable Signature Scheme in Standard Model [J]. Computer Science, 2013, 40(5): 158-163. |
[12] | JI Hui-fang, HAN Wen-bao, LIU Lian-dong. New Identity-based Proxy Signature in the Standard Model [J]. Computer Science, 2011, 38(8): 88-91. |
[13] | HUANG Gang,LI Jin-hang,JIA Yan. SWO: A Fast Search Algorithm Based on Small World Effect [J]. Computer Science, 2011, 38(7): 255-260. |
[14] | YU Yi-ke,ZHEN Xue-feng,HAN Xiao-guang,LIU Xing-bing. Efficient ID-based Proxy Signature in the Standard Model [J]. Computer Science, 2011, 38(6): 133-139. |
[15] | WANG Zhi-yi,LIU Tie,KANG Li,XIE Jing,LEI Gang. Short Public Key Provable Security Identity-based Signature Scheme [J]. Computer Science, 2011, 38(3): 136-139. |
|