원문정보
초록
영어
Password-based authenticated key agreement is widely used for systems that control remote access to computer networks. It has dual purposes of authentication and key agreement between two parties. Recently, Wang et al. were provided cryptanalysis focused on some attacks, especially for the password guessing attack, from a previous password-based authentication scheme and proposed a robust scheme to cope with the attacks. However, this paper points out that Wang et al.’s scheme has high computational overhead and proposes an anonymous password-based authenticated key agreement scheme with non-tamper resistant smart cards to reduce the overhead. The proposed scheme meets all the criteria required for the authenticated key agreement scheme and eliminates security threats.
목차
1. Introduction
2. Background
2.1. Network Configuration
2.2. Required Security Criteria
3. Proposed Authenticated Key Agreement Scheme
3.1. Registration Phase
3.2. Login and Verification Phase
3.3. Password Change Phase
4. Analysis
4.1. Security Analysis
4.2. Performance Analysis
5. Conclusion
References