Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity
From MaRDI portal
Publication:1750012
DOI10.1016/j.ins.2015.03.070zbMath1391.94807OpenAlexW2092258731MaRDI QIDQ1750012
Sihan Qing, Ding Wang, Nan Wang, Ping Wang
Publication date: 17 May 2018
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2015.03.070
Related Items (5)
Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy ⋮ Adaptively secure certificate-based broadcast encryption and its application to cloud storage service ⋮ End to end communication rate-based adaptive fault tolerant control of multi-agent systems under unreliable interconnections ⋮ Quantum private set intersection cardinality and its application to anonymous authentication ⋮ Evolutionary trust scheme of certificate game in mobile cloud computing
Uses Software
Cites Work
- Unnamed Item
- A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture
- Two-server password-only authenticated key exchange
- A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks
- Provable secure authentication protocol with anonymity for roaming service in global mobility networks
- A generic framework for anonymous authentication in mobile networks
- Cryptanalysis of a password authentication scheme over insecure networks
- Two-factor mutual authentication based on smart cards and passwords
- A provable authenticated group key agreement protocol for mobile environment
- Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys
- Group signatures with controllable linkability for dynamic membership
- The Next Smart Card Nightmare
- Power Analysis of Atmel CryptoMemory – Recovering Keys from Secure EEPROMs
- Password-Based Authenticated Key Exchange
- Efficient and secure authenticated key exchange using weak passwords
- The Random Oracle Model and the Ideal Cipher Model Are Equivalent
- Examining smart-card security under the threat of power analysis attacks
- Retracted: An Enhanced Anonymous Authentication and Key Exchange Scheme Using Smartcard
- Secure integration of asymmetric and symmetric encryption schemes
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Public Key Cryptography - PKC 2005
- Public Key Cryptography – PKC 2004
This page was built for publication: Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity