Skip to main content

Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards

  • Conference paper
  • 3650 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7873))

Abstract

A new geometry-based authentication and key agreement scheme, without invoking traditional strong symmetric and/or asymmetric encryption functions, is constructed by taking advantage of the geometric property that (n + 1) generic points in an n-dimensional space can determine a unique hyper-sphere under certain conditions. The security and performance of the scheme are analyzed. Experiments are also conducted to show that the scheme is efficient and is easy to implement.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Das, A.: A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications. Networking Science, 1–16 (2012), http://dx.doi.org/10.1007/s13119-012-0009-8

  2. Guo, C., Chang, C.: Chaotic maps-based password-authenticated key agreement using smart cards. Communications in Nonlinear Science and Numerical Simulation 18(6), 1433–1440 (2013), http://www.sciencedirect.com/science/article/pii/S1007570412004698

    Article  Google Scholar 

  3. Chien, H.-Y., Jan, J.-K., Tseng, Y.-M.: A modified remote login authentication scheme based on geometric approach. Journal of Systems and Software 55, 287–290 (2001)

    Article  Google Scholar 

  4. Wang, S.H., Bao, F., Wang, J.: Comments on yet another log-in authentication using n-dimensional construction. IEEE Transaction on Consumer Electronics 50, 606–608 (2004)

    Article  Google Scholar 

  5. Hwang, M.S.: Cryptanalysis of a remote login authentication scheme. Computer Communications 22, 742–744 (1999)

    Article  Google Scholar 

  6. Juang, W., Chen, S., Liaw, H.: Robust and efficient password-authenticated key agreement using smart cards. IEEE Transactions on Industrial Electronics 55(6), 2551–2556 (2008)

    Article  Google Scholar 

  7. Lennon, R., Matyas, S., Meyer, C.: Cryptographic authentication of time-invariant quantities. IEEE Transactions on Communications 29(6), 773–777 (1981)

    Article  Google Scholar 

  8. Li, X., Qiu, W., Zheng, D., Chen, K., Li, J.: Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Transactions on Industrial Electronics 57(2), 793–800 (2010)

    Article  Google Scholar 

  9. Li, X., Ma, J., Wang, W., Xiong, Y., Zhang, J.: A novel smart card and dynamic id based remote user authentication scheme for multi-server environments. Mathematical and Computer Modelling (2012), http://www.sciencedirect.com/science/article/pii/S0895717712001720

  10. Luby, M., Rackoff, C.: A study of password security. Journal of Cryptology I, 151–158 (1989)

    Article  MathSciNet  Google Scholar 

  11. Menkus, B.: Understanding the use of passwords. Computers and Security 7, 132–136 (1988)

    Article  Google Scholar 

  12. Sun, D., Huai, J., Sun, J., Li, J., Zhang, J., Feng, Z.: Improvements of Juang et al ’s password-authenticated key agreement scheme using smart cards. IEEE Transactions on Industrial Electronics 56(6), 2284–2291 (2009)

    Article  Google Scholar 

  13. Wang, S.J.: Yet another login authentication using n-dimensional construction based on circle property. IEEE Transaction on Consumer Electronics 49, 337–341 (2003)

    Article  Google Scholar 

  14. Wang, S., Chang, F.: Smart card based secure password authentication scheme. Computers and Security 15, 231–237 (1996)

    Article  Google Scholar 

  15. Wu, T.C.: Remote login authentication scheme based on a geometric approach. Computer Communications 18, 959–963 (1995)

    Article  Google Scholar 

  16. Yang, F.Y., Jan, J.K.: Cryptanalysis of log-in authentication based on circle property. IEEE Transaction on Consumer Electronics 50, 625–628 (2004)

    Article  Google Scholar 

  17. Yang, W., Shieh, S.: Password authentication schemes with smart cards. Computers and Security 18, 727–733 (1999)

    Article  Google Scholar 

  18. Zhang, L., Tang, S., Cai, Z.: Efficient and flexible password authenticated key agreement for voice over internet protocol session initiation protocol using smart card. International Journal of Communication Systems (2013), http://dx.doi.org/10.1002/dac.2499

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tang, S., Xu, L. (2013). Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards. In: Lopez, J., Huang, X., Sandhu, R. (eds) Network and System Security. NSS 2013. Lecture Notes in Computer Science, vol 7873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38631-2_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38631-2_40

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38630-5

  • Online ISBN: 978-3-642-38631-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics