Redirigiendo al acceso original de articulo en 23 segundos...
Inicio  /  Applied Sciences  /  Vol: 10 Par: 22 (2020)  /  Artículo
ARTÍCULO
TITULO

Elliptic Curve Signcryption-Based Mutual Authentication Protocol for Smart Cards

Anuj Kumar Singh    
Arun Solanki    
Anand Nayyar and Basit Qureshi    

Resumen

In the modern computing environment, smart cards are being used extensively, which are intended to authenticate a user with the system or server. Owing to the constrictions of computational resources, smart card-based systems require an effective design and efficient security scheme. In this paper, a smart card authentication protocol based on the concept of elliptic curve signcryption has been proposed and developed, which provides security attributes, including confidentiality of messages, non-repudiation, the integrity of messages, mutual authentication, anonymity, availability, and forward security. Moreover, the analysis of security functionalities shows that the protocol developed and explained in this paper is secure from password guessing attacks, user and server impersonation, replay attacks, de-synchronization attacks, insider attacks, known key attacks, and man-in-the-middle attacks. The results have demonstrated that the proposed smart card security protocol reduces the computational overhead on a smart card by 33.3% and the communication cost of a smart card by 34.5%, in comparison to the existing efficient protocols. It can, thus, be inferred from the results that using elliptic curve signcryption in the authentication mechanism reduces the computational cost and communication overhead by a significant amount.

 Artículos similares

       
 
Bikash Poudel, Arslan Munir, Joonho Kong and Muazzam A. Khan    
The elliptic curve cryptosystem (ECC) has been proven to be vulnerable to non-invasive side-channel analysis attacks, such as timing, power, visible light, electromagnetic emanation, and acoustic analysis attacks. In ECC, the scalar multiplication compon... ver más

 
Haotian Liang, Guidong Zhang, Wenjin Hou, Pinyi Huang, Bo Liu and Shouliang Li    
Most of the image encryption schemes based on chaos have so far employed symmetric key cryptography, which leads to a situation where the key cannot be transmitted in public channels, thus limiting their extended application. Based on the elliptic curve ... ver más
Revista: Applied Sciences

 
Ali Takieldeen, Said H. Abd Elkhalik, Ahmed S. Samra, Mohamed A. Mohamed and Fahmi Khalifa    
With the progressive development of a wide range of applications, interconnect things and internet of things (IoT) became an imperative required trend by industries and academicians. IoT became a base infrastructure for remote access or control depending... ver más
Revista: Information

 
Hwajeong Seo    
In this paper, we present scalable multi-precision multiplication implementation and scalable multi-precision squaring implementation for 32-bit ARM Cortex-M4 microcontrollers. For efficient computation and scalable functionality, we present optimized Mu... ver más
Revista: Applied Sciences

 
Su-Won Son, Jong-Chan Yoon and Jin-Man Kim    
Global warming is becoming worse owing to carbon dioxide emissions around the world, and eco-friendly energy for reducing carbon dioxide emissions is gaining importance. Wind power plants are the most representative of the environmentally friendly energy... ver más