Skip to main content

Comments on ID-Based Client Authentication with Key Agreement Protocol on ECC for Mobile Client-Server Environment

  • Conference paper
Advances in Computing and Communications (ACC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 191))

Included in the following conference series:

Abstract

In 2011, Debiao et al. proposed an ID-based remote mutual authentication with key agreement scheme on ECC for mobile client-server environment [H. Debiao, C. Jianhua, H. Jin: An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security, Information Fusion, 2011]. They claimed their scheme provides remote mutual authentication with key agreement and is secured against various known attacks. In this paper, we show that their proposed scheme has some other security flaws.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ElGamal, T.: A public key cryptosystem and a signature protocol based on discrete logarithms. IEEE Trans. on Info. 31, 469–472 (1985)

    Article  MathSciNet  MATH  Google Scholar 

  2. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Comm. of the ACM 21(2), 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  3. Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)

    Google Scholar 

  4. Koblitz, N.: Elliptic curve cryptosystem. J. of Math. of Comp. 48(177), 203–209 (1987)

    Article  MathSciNet  MATH  Google Scholar 

  5. Das, M.L., Saxena, A., Gulati, V.P., Phatak, D.B.: A novel remote client authentication protocol using bilinear pairings. Comp. & Secu. 25(3), 184–189 (2006)

    Article  Google Scholar 

  6. Das, M.L., Saxena, A., Gulati, V.P.: A dynamic ID-based remote user authentication scheme. IEEE Trans. on Cons. Elec. 50(2), 629–631 (2004)

    Article  Google Scholar 

  7. Chou, J.S., Chen, Y., Lin, J.Y.: Improvement of Das et al.’s remote user authentication scheme (2005), http://eprint.iacr.org/2005/450.pdf

  8. Goriparthi, T., Das, M.L., Saxena, A.: An improved bilinear pairing based remote user authentication scheme. Comp. Stan. & Inte. 31, 181–185 (2009)

    Article  Google Scholar 

  9. Tseng, Y.M., Wu, T.Y., Wu, J.D.: A pairing-based client authentication protocol for wireless clients with smart cards. Informatica 19(2), 285–302 (2008)

    Google Scholar 

  10. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  11. Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  12. Wang, Y.Y., Kiu, J.Y., Xiao, F.X., Dan, J.: A more efficient and secure dynamic ID-based remote user authentication scheme. Comp. Comm. 32, 583–585 (2009)

    Article  Google Scholar 

  13. Khan, M.K.: Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’. Comp. Comm. 34(3), 305–309 (2011)

    Article  Google Scholar 

  14. Yang, J.H., Chang, C.C.: An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comp. & Secu. 28(3), 138–143 (2011)

    Google Scholar 

  15. Yoon, E., Yoo, K.: Robust ID-based remote mutual authentication with key agreement protocol for mobile devices on ECC. In: 2009 International Conference on Computational Science and Engineering, Vancouver, Canada, pp. 633–640 (2009)

    Google Scholar 

  16. Chen, T.H., Chen, Y.C., Shih, W.K.: An Advanced ECC ID-Based remote mutual authentication scheme for mobile devices. In: Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, pp. 116–120 (2010)

    Google Scholar 

  17. Debiao, H., Jianhua, C., Jin, H.: An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security. Info. Fusi (2011), doi:10.1016/j.inffus.2011.01.001

    Google Scholar 

  18. Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453–472. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  19. Cheng, Z., Nistazakis, M., Comley, R., Vasiu, L.: On the indistinguishability-based security model of key agreement protocols-simple cases. Cryptology ePrint Archive, Report 2005/129 (2005)

    Google Scholar 

  20. Gong, L.: A security risk of depending on synchronized clocks. ACM SIGOPS Operating System Review 26(1), 49–53 (1992)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hafizul Islam, S.K., Biswas, G.P. (2011). Comments on ID-Based Client Authentication with Key Agreement Protocol on ECC for Mobile Client-Server Environment. In: Abraham, A., Lloret Mauri, J., Buford, J.F., Suzuki, J., Thampi, S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 191. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22714-1_65

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22714-1_65

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22713-4

  • Online ISBN: 978-3-642-22714-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics