Efficient password-based authentication and key exchange scheme preserving user privacy

Zhenchuan Chai, Zhenfu Cao, Rongxing Lu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

20 Scopus citations

Abstract

With the flourish of applications over the wired /wireless networks, how to keep user's privacy has drawn growing concerns in recent years. Although the issue of user anonymity has been addressed in digital signature field by introducing the concepts of ring and group signatures, they are not suitable to anonymously authenticate a user in wireless mobile applications, because these signature schemes need infrastructure support and heavy computational costs which is beyond the computational ability of a smart card embedded in a hand-held device. In this paper, we propose an anonymous authentication scheme which also supports Diffie-Hellman key exchange. Our scheme is very efficient since it mainly uses hash and XOR operations. Moreover, our scheme possesses many good virtues of existing authentication schemes.

Original languageEnglish
Title of host publicationWireless Algorithms, Systems, and Applications - First International Conference, WASA 2006, Proceedings
PublisherSpringer Verlag
Pages467-477
Number of pages11
ISBN (Print)3540371893, 9783540371892
DOIs
StatePublished - 2006
Externally publishedYes
EventFirst International Conference on Wireless Algorithms, Systems, and Applications, WASA 2006 - Xi'an, China
Duration: 15 Aug 200617 Aug 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4138 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceFirst International Conference on Wireless Algorithms, Systems, and Applications, WASA 2006
Country/TerritoryChina
CityXi'an
Period15/08/0617/08/06

Fingerprint

Dive into the research topics of 'Efficient password-based authentication and key exchange scheme preserving user privacy'. Together they form a unique fingerprint.

Cite this