Skip to main content

A Secret-Key Exponential Key Agreement Protocol with Smart Cards

  • Conference paper
  • 833 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4610))

Abstract

The smart card based remote user authentication and key agreement protocol is a very practical solution to create a secure distributed computer environment. In this paper, we propose a smart card based secret-key exponential key agreement protocol called SEKA, which provides mutual authentication and key agreement over an insecure channel between user and server. The computational complexity that the client must perform is just one exponentiation and two hash functions during the runtime of the protocol.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lamport, L.: Password Authentication with Insecure Communication. Communications of the ACM 24(11), 770–772 (1981)

    Article  MathSciNet  Google Scholar 

  2. Chang, C.C., Wu, T.C.: Remote Password Authentication with Smart Cards. IEE Proceedings-E 138(3), 165–168 (1991)

    Google Scholar 

  3. Chang, C., Hwang, S.: Using Smart Cards to Authenticate Remote Passwords. Comput. Math. Appl. 26(7), 19–27 (1993)

    Article  MATH  Google Scholar 

  4. Wang, S., Chang, T.: Smart Card based Secure Password Authentication Scheme. Computers & Security 15(3), 231–237 (1996)

    Article  MathSciNet  Google Scholar 

  5. Wu, T.C., Sung, H.S.: Authentication Passwords over an Insecure Channel. Computer & Security 15(5), 431–439 (1996)

    Article  Google Scholar 

  6. Yang, W.H., Shieh, S.P.: Password Authentication Schemes with Smart Card. Computer & Security 18(8), 727–733 (1999)

    Article  Google Scholar 

  7. Hwang, M.S., Li, L.H.: A New Remote User Authentication Scheme Using Smart Cards. IEEE Trans. On Consumer Electronics 46(1), 28–30 (2000)

    Article  Google Scholar 

  8. Sun, H.M.: An Efficient Remote User Authentication Scheme Using Smart Cards. IEEE Trans. on Consumer Electronics 46(4), 958–961 (2000)

    Article  Google Scholar 

  9. Chien, H.Y., Jan, J.K., Tseng, Y.M.: An Efficient and Practical Solution to Remote Authentication: Smart Card. Computers & Security 21(4), 372–375 (2002)

    Article  Google Scholar 

  10. Fan, L., Li, J.H., Zhu, H.W.: An Enhancement of Timestamp-based Password Authentication Scheme. Computers & Security 21(7), 665–667 (2002)

    Article  Google Scholar 

  11. Wu, S.T., Chieu, B.C.: A User Friendly Remote Authentication Scheme with Smart Cards. Computers & Security 22(6), 547–550 (2003)

    Article  Google Scholar 

  12. Shen, J.J., Lin, C.W., Hwang, M.S.: Security Enhancement for the Timestampbased Password Authentication Scheme Using Smart Cards. Computers & Security 22(7), 591–595 (2003)

    Article  Google Scholar 

  13. Chen, K.F.: Attacks on the (Enhanced) Yang-Shieh Authentication. Computers & Security 22(8), 725–727 (2003)

    Article  Google Scholar 

  14. Wu, S.T., Chieu, B.C.: A User Friendly Remote Authentication Scheme with Smart Cards. Computers & Security 22(6), 547–550 (2003)

    Article  Google Scholar 

  15. Yoon, E.J., Ryu, E.K., Yoo, K.Y.: Security of Shen et al. ’s Timestamp-based Password Authentication Scheme. In: Laganà, A., Gavrilova, M., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3046, pp. 665–671. Springer, Heidelberg (2004)

    Google Scholar 

  16. Yoon, E.J., Ryu, E.K., Yoo, K.Y.: Robust Remote User Authentication Scheme. In: Kahng, H.-K., Goto, S. (eds.) ICOIN 2004. LNCS, vol. 3090, pp. 935–942. Springer, Heidelberg (2004)

    Google Scholar 

  17. Juang, W.S.: Efficient Password Authenticated Key Agreement Using Smart Cards. Computers & Security 23(2), 167–173 (2004)

    Article  Google Scholar 

  18. Jablon, D.: Strong Password-only Authenticated Key Exchange. ACM Computer Communications Review 26(5), 5–26 (1996)

    Article  Google Scholar 

  19. Bellovin, S., Merritt, M.: Encrypted Key Exchange: Password-based Protocols Secure Against Dictionary Attacks. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 72–84 (1992)

    Google Scholar 

  20. Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Trans Inf Theory IT-22(6), 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  21. Rivest, R.: The MD5 Message-digest Algorithm. RFC 1321. Internet Activities Board. Internet Privacy Task Force (1992)

    Google Scholar 

  22. NIST FIPS PUB 180.: Secure Hash Standard. National Institute of Standards and Technology. U.S. Department of Commerce. DRAFT (1993)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Bin Xiao Laurence T. Yang Jianhua Ma Christian Muller-Schloer Yu Hua

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yoon, EJ., Yoo, KY. (2007). A Secret-Key Exponential Key Agreement Protocol with Smart Cards. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds) Autonomic and Trusted Computing. ATC 2007. Lecture Notes in Computer Science, vol 4610. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73547-2_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73547-2_44

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73546-5

  • Online ISBN: 978-3-540-73547-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics