4.6 Article

A Secure User Authentication Protocol for Heterogeneous Mobile Environments

期刊

IEEE ACCESS
卷 10, 期 -, 页码 69757-69770

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2022.3186683

关键词

User authentication; key agreement; random oracle model; heterogeneous environment

资金

  1. Deputyship for Research and Innovation, Ministry of Education in Saudi Arabia under the Institutional Funding Committee at Najran University, Saudi Arabia [NU/IFC/ENT/01/013]

向作者/读者索取更多资源

Mobile devices play a significant role in our daily lives, but they also bring security concerns when using internet applications. This paper proposes an efficient user authentication and key agreement protocol for heterogeneous client-server mobile environments. The proposed scheme is secure and suitable for applications using different cryptographic approaches.
Mobile devices have become very important for our daily needs. The user authentication protocols with the key agreement are required to deal with the security issues that arise from the use of mobile devices through Internet applications. However, existing user authentication protocols are only suitable if the client and the server use a similar cryptographic approach. Therefore, it is important to develop an authentication protocol for mobile environments with heterogeneous cryptographic approaches. In this paper, an efficient user authentication and key agreement protocol is proposed for a heterogeneous client-server mobile environment. The security of the proposed scheme is formally proved under the q-strong Diffie-Hellman problem (q-SDH), the q-bilinear Diffe-Hellman inversion problem (q-BDHI), and the modified bilinear Diffie-Hellman inversion problem (mBDHI), respectively. Our scheme has reasonable processing costs and communication costs on the client and server sides. Moreover, our scheme is suitable for applications that use different cryptographic approaches. In particular, the proposed protocol can work when the client applies the identity-based cryptosystem and the server applies the certificateless cryptosystem.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据