English  |  正體中文  |  简体中文  |  Items with full text/Total items : 53693/88315 (61%)
Visitors : 9966060      Online Users : 14
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/115305

    Title: A Robust Remote Authentication Scheme for M-Commerce Environments
    Authors: Shih-Yang Yang;Jian-Wen Peng;Wen-Bing Horng;Ching-Ming Chao
    Keywords: Authentication;Quadratic congruence;Security
    Date: 2018-11-15
    Issue Date: 2018-10-23 12:10:25 (UTC+8)
    Abstract: With the rapid growth of electronic and mobile commerce
    today, how to design a secure and ecient remote user authentication
    scheme with resource-limited devices over insecure networks has become
    an important issue. In this paper, we present a robust authentication
    scheme for the mobile device (a non-tamper-resistant device in which
    the secret authentication information stored in it could be retrieved) to
    solve the challenging lost device problem. It tries to satisfy the following
    advanced essential security features: (1) protecting user privacy in terms
    of anonymity and non-traceability, (2) supporting session keys with per-
    fect forward secrecy, and (3) secure even for the case of lost devices,
    in addition to the conventional security requirements. The security of
    our scheme is based on the quadratic residue assumption, which has the
    same complexity as in solving the discrete logarithm problem. However,
    the computation of the quadratic congruence is very ecient. It only
    needs one squaring and one modular operations in the mobile device
    end, which is much cheaper than the expensive modular exponentiation
    used in those schemes based on the discrete logarithm problem. Thus,
    using the quadratic congruence, our scheme can achieve robustness and
    eciency, even for the non-tamper-resistant mobile device.
    Relation: EI
    Appears in Collections:[資訊工程學系暨研究所] 會議論文

    Files in This Item:

    File Description SizeFormat

    All items in 機構典藏 are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback