Efficient method for remote authentication based on Elliptic Curve Cryptography
Publish place: 16th Iran"s Electrical Engineering Student Conference
Publish Year: 1392
نوع سند: مقاله کنفرانسی
زبان: English
View: 852
This Paper With 6 Page And PDF Format Ready To Download
- Certificate
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
ISCEE16_335
تاریخ نمایه سازی: 21 تیر 1393
Abstract:
In recent years, the design method for authentication of mobile devices is a challenging problem. Due to the memory constraints and low computing power of mobile devices now,Elliptic Curve Cryptography-based schemes use for remoteauthentication is taken into consideration. The reason for thischoice is that Elliptic Curve Cryptography modes have for keylength and less computationally expensive than other schemessuch as, RSA or even Pairing Bilinear pairing. The primaryschemes for authentication based on Elliptic Curvecryptography, authentication and key distribution wouldestablish two-way. Yang proposed a mutual authenticationmethod first, but then other researchers have questioned thesafety of this procedure. In this paper it will be shown thatseparating security problems, there are some structuralproblems in the method of Yang. Then remove the objection, theproposed method will not only eliminate security problems andstructural, but in terms of the computational cost would be moreefficient.
Keywords:
Authors
Ali zahe
Masters
Morteza nikooghadam
Assistant Professor
مراجع و منابع این Paper:
لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :