• No results found

[PDF] Top 20 A Remote User Authentication Scheme using Bilinear Pairings

Has 10000 "A Remote User Authentication Scheme using Bilinear Pairings" found on our website. Below are the top 20 most common "A Remote User Authentication Scheme using Bilinear Pairings".

A Remote User Authentication Scheme using Bilinear Pairings

A Remote User Authentication Scheme using Bilinear Pairings

... al. scheme is still insecure against the replay, forgery and impersonation ...improved scheme that is also secure against replay, forgery and impersonation attack and also enables user to choose and ... See full document

5

An Efficient ID based Proxy Signcryption Scheme without Bilinear Pairings

An Efficient ID based Proxy Signcryption Scheme without Bilinear Pairings

... integrity, authentication, and non-repudiation are the most important security requirements for many ...entities. Authentication is the assurance that the communicating party is the one that it claims to ... See full document

6

A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS

A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS

... password-based remote user authentication and key agreement scheme using common storage devices such as USB ...proposed scheme is based on the difficulty of cracking the ... See full document

7

An Improved Efficient Remote User Authentication Scheme in Multi server Environment using Smart Card

An Improved Efficient Remote User Authentication Scheme in Multi server Environment using Smart Card

... proposed scheme and Taygi et al.’s [1] scheme is 2688 bits = (64 + 64 + 128 + 1024 + 1024 + 128 + 128 + 128) and 4608 bits = (64 + 64 + 1024 + 1024 + 128 + 64 + 128 + 1024 + 64 + 1024) ...proposed ... See full document

6

Efficient  identity-based  threshold  decryption   scheme  from  bilinear  pairings

Efficient identity-based threshold decryption scheme from bilinear pairings

... a user can get its private key by obtaining more than t shares from di ff erent distributed ...IBE scheme [11] by adding the key sharing algorithm and the key recovering ...the user can not share his ... See full document

18

ID-Based Directed Blind Signature Scheme from Bilinear Pairings.

ID-Based Directed Blind Signature Scheme from Bilinear Pairings.

... a user acquire a signature from the signer without reveling message content for personal ...Signature Scheme from Bilinear Pairings” which combining the concept of blind signatures and digital ... See full document

6

Cryptanalysis  of  a  Markov  Chain  Based  User  Authentication  Scheme

Cryptanalysis of a Markov Chain Based User Authentication Scheme

... Remote user authentication scheme was first proposed by the author Lamport [1] based on the hash ...of authentication protocols [2, 3, 4, 6, 7, 10, 11, 12, 15, 16, 19, 20, 26, 27, 28, ... See full document

6

Cryptanalysis  Of  Dynamic  ID  Based  Remote  User  Authentication  Scheme  With  Key  Agreement

Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement

... of remote digital services and electronic transactions; authentication schemes that ensure secure communication through an insecure channel are gaining popularity and have been studied widely in recent ... See full document

8

A  Non-delegatable  Identity-based  Designated  Verifier  Signature  Scheme  without  Bilinear  Pairings

A Non-delegatable Identity-based Designated Verifier Signature Scheme without Bilinear Pairings

... schemes using bilinear pairings are ...schemes, bilinear pairings are employed either in signing and verifying steps or only in the verifying ...of pairings at a security level ... See full document

14

An Efficient Key Escrow-Free Identity-based Short Signature Scheme from Bilinear Pairings

An Efficient Key Escrow-Free Identity-based Short Signature Scheme from Bilinear Pairings

... signature scheme from bilinear pairings has been ...proposed scheme is short because the signature is consists of one element of source group used in bilinear ...proposed scheme ... See full document

5

Secure Smart Card Based Remote User Authentication Scheme for Multi-server Environment

Secure Smart Card Based Remote User Authentication Scheme for Multi-server Environment

... agreement scheme using smart ...this scheme, we assume the registration center can be ...The user only has to register at the registration center once and can use services provided by various ... See full document

7

A VERIFIABLE PROXY SIGNATURE SCHEME BASED ON BILINEAR PAIRINGS WITH IDENTITY-BASED CRYPTOGRAPHIC APPROACHES

A VERIFIABLE PROXY SIGNATURE SCHEME BASED ON BILINEAR PAIRINGS WITH IDENTITY-BASED CRYPTOGRAPHIC APPROACHES

... and bilinear pairings, various ID-based applications using bilinear pairings have been proposed [11, 14, 18, ...Hu-Huang scheme, the proxy public key is computed from a ...Huang ... See full document

9

Elliptic Curve Cryptography based Secure and Efficient Authentication Protocol for Smart Card Users

Elliptic Curve Cryptography based Secure and Efficient Authentication Protocol for Smart Card Users

... based user authentication ...improved scheme for authentication where non-storage of data on the server side is taken ...the scheme of Awasthi et ...a scheme using the ... See full document

5

Vehicular Cloud Network and Information Security Mechanisms

Vehicular Cloud Network and Information Security Mechanisms

... adopts bilinear pairings and chameleon hash function for a RSU and a mobile device of vehicle or user to authenticate the identity of each ...of user data transferred in the cloud against the ... See full document

8

SUMMARIES

SUMMARIES

... many remote user authentication schemes proposed in literature for preventing unauthorized parties from acces- sing resources in an insecure ...storing user authentication ...secure ... See full document

6

Weakness of a Password Based Remote User Authentication Scheme

Weakness of a Password Based Remote User Authentication Scheme

... an authentication server (AS) a password based remote user authentication schemes is ...The remote user makes a login request with the help of some secret information which are ... See full document

6

Revisiting the “An Improved Remote User Authentication Scheme with Key Agreement”

Revisiting the “An Improved Remote User Authentication Scheme with Key Agreement”

... Due to the parameters {Y i , D i , E i , h(.), A i and M i } are stored in the smart card and Ui himself may compute RPwi = h(b||P wi ), b = A i ⊕ (ID i ||P wi ), h(ID i ||x)= M i ⊕ RP wi ⊕ b, and y i = Y i ⊕ h(ID i ... See full document

5

Remote User Authentication Scheme in Multi server Environment using Smart Card

Remote User Authentication Scheme in Multi server Environment using Smart Card

... al.’s scheme is exposed to impersonation attack and is unrealistic as every user must have a large amount of memory to store the public parameters for ...authentication. Using one-way hash ... See full document

5

AN  ENHANCED  BIOMETRIC  BASED  REMOTE  USER  AUTHENTICATION  SCHEME  USING  SMART  CARD

AN ENHANCED BIOMETRIC BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD

... proposed scheme consist of four mainly phases which are Registration Phase, Login Phase, Authentication Phase and Password Change ...new user related to network system who wants to become legal ... See full document

13

A Robust Remote User Authentication Scheme Using Smart Card

A Robust Remote User Authentication Scheme Using Smart Card

... Abstract. Remote user authentication is important to identify whether communicating parties are genuine and trust- worthy using the password and the smart card between a login user and ... See full document

10

Show all 10000 documents...