Skip navigation
  • 中文
  • English

DSpace CRIS

  • DSpace logo
  • Home
  • Research Outputs
  • Researchers
  • Organizations
  • Projects
  • Explore by
    • Research Outputs
    • Researchers
    • Organizations
    • Projects
  • Communities & Collections
  • SDGs
  • Sign in
  • 中文
  • English
  1. National Taiwan Ocean University Research Hub
  2. 電機資訊學院
  3. 資訊工程學系
Please use this identifier to cite or link to this item: http://scholars.ntou.edu.tw/handle/123456789/16620
Title: An Attribute-Based Mutual Authentication Scheme with Time-Bounded Keys
Authors: Han-Yu Lin 
Pei-Yih Ting 
Hong-Ru Wu
Issue Date: 9-Nov-2019
Publisher: Association for Computing Machinery
Start page/Pages: 75–79
Source: ICTCE '19: Proceedings of the 3rd International Conference on Telecommunications and Communication Engineering
Conference: ICTCE 2019: 2019 The 3rd International Conference on Telecommunications and Communication Engineering
Abstract: 
Remote user authentication scheme is an important technique for securely accessing the resources of servers. Traditionally, password-based authentication schemes are commonly adopted mechanisms, i.e., a user first chooses a password and then registers to the server for becoming a legitimate member. Nevertheless, such schemes are vulnerable to password guessing attacks and a remote server might have to maintain a password table for verifying users. In recent years, attribute-based cryptosystems have been received much attention. An attribute-based authentication scheme allows a remote system to verify a user's membership according to his/her owned attribute sets without using passwords. In 2015, Yun et al. proposed an improved attribute-based authentication protocol by utilizing Shamir's secret sharing technique. Their protocol is secure against man-in-the-middle, replay and collusion attacks. However, we find out that their scheme only achieves one-way authentication rather than mutual authentication. In this paper, we extend their work to further fulfill the crucial property of mutual authentication. Moreover, we incorporate the concept of time-bounded keys into the extended variant for providing more flexible applications in the real world.
Description: 
舉辦地點:Tokyo Japan
URI: http://scholars.ntou.edu.tw/handle/123456789/16620
ISBN: 978-1-4503-7180-3
DOI: https://doi.org/10.1145/3369555.3369568
Appears in Collections:資訊工程學系

Show full item record

Page view(s)

180
Last Week
0
Last month
0
checked on Jun 30, 2025

Google ScholarTM

Check

Altmetric

Altmetric

Related Items in TAIR


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Explore by
  • Communities & Collections
  • Research Outputs
  • Researchers
  • Organizations
  • Projects
Build with DSpace-CRIS - Extension maintained and optimized by Logo 4SCIENCE Feedback