Elliptic Curve Signcryption-Based Mutual Authentication Protocol for Smart Cards
In the modern computing environment, smart cards are being used extensively, which are intended to authenticate a user with the system or server. Owing to the constrictions of computational resources, smart card-based systems require an effective design and efficient security scheme. In this paper,...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-11-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/10/22/8291 |
id |
doaj-f91ef6fb224e4efe89fb08c1fdbad684 |
---|---|
record_format |
Article |
spelling |
doaj-f91ef6fb224e4efe89fb08c1fdbad6842020-11-25T04:11:46ZengMDPI AGApplied Sciences2076-34172020-11-01108291829110.3390/app10228291Elliptic Curve Signcryption-Based Mutual Authentication Protocol for Smart CardsAnuj Kumar Singh0Arun Solanki1Anand Nayyar2Basit Qureshi3Department of Computer Science & Engineering, Amity University Haryana, Gurugram 122413, IndiaDepartment of Computer Science & Engineering, Gautam Buddha University, Greater Noida 201312, IndiaGraduate School, Duy Tan University, Da Nang 550000, VietnamRobotics and Internet of Things Lab, Department of Computer Science, Prince Sultan University, Riyadh 11586, Saudi ArabiaIn the modern computing environment, smart cards are being used extensively, which are intended to authenticate a user with the system or server. Owing to the constrictions of computational resources, smart card-based systems require an effective design and efficient security scheme. In this paper, a smart card authentication protocol based on the concept of elliptic curve signcryption has been proposed and developed, which provides security attributes, including confidentiality of messages, non-repudiation, the integrity of messages, mutual authentication, anonymity, availability, and forward security. Moreover, the analysis of security functionalities shows that the protocol developed and explained in this paper is secure from password guessing attacks, user and server impersonation, replay attacks, de-synchronization attacks, insider attacks, known key attacks, and man-in-the-middle attacks. The results have demonstrated that the proposed smart card security protocol reduces the computational overhead on a smart card by 33.3% and the communication cost of a smart card by 34.5%, in comparison to the existing efficient protocols. It can, thus, be inferred from the results that using elliptic curve signcryption in the authentication mechanism reduces the computational cost and communication overhead by a significant amount.https://www.mdpi.com/2076-3417/10/22/8291smart cardsecurityelliptic curve cryptographyauthenticationsigncryptionprotocol |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Anuj Kumar Singh Arun Solanki Anand Nayyar Basit Qureshi |
spellingShingle |
Anuj Kumar Singh Arun Solanki Anand Nayyar Basit Qureshi Elliptic Curve Signcryption-Based Mutual Authentication Protocol for Smart Cards Applied Sciences smart card security elliptic curve cryptography authentication signcryption protocol |
author_facet |
Anuj Kumar Singh Arun Solanki Anand Nayyar Basit Qureshi |
author_sort |
Anuj Kumar Singh |
title |
Elliptic Curve Signcryption-Based Mutual Authentication Protocol for Smart Cards |
title_short |
Elliptic Curve Signcryption-Based Mutual Authentication Protocol for Smart Cards |
title_full |
Elliptic Curve Signcryption-Based Mutual Authentication Protocol for Smart Cards |
title_fullStr |
Elliptic Curve Signcryption-Based Mutual Authentication Protocol for Smart Cards |
title_full_unstemmed |
Elliptic Curve Signcryption-Based Mutual Authentication Protocol for Smart Cards |
title_sort |
elliptic curve signcryption-based mutual authentication protocol for smart cards |
publisher |
MDPI AG |
series |
Applied Sciences |
issn |
2076-3417 |
publishDate |
2020-11-01 |
description |
In the modern computing environment, smart cards are being used extensively, which are intended to authenticate a user with the system or server. Owing to the constrictions of computational resources, smart card-based systems require an effective design and efficient security scheme. In this paper, a smart card authentication protocol based on the concept of elliptic curve signcryption has been proposed and developed, which provides security attributes, including confidentiality of messages, non-repudiation, the integrity of messages, mutual authentication, anonymity, availability, and forward security. Moreover, the analysis of security functionalities shows that the protocol developed and explained in this paper is secure from password guessing attacks, user and server impersonation, replay attacks, de-synchronization attacks, insider attacks, known key attacks, and man-in-the-middle attacks. The results have demonstrated that the proposed smart card security protocol reduces the computational overhead on a smart card by 33.3% and the communication cost of a smart card by 34.5%, in comparison to the existing efficient protocols. It can, thus, be inferred from the results that using elliptic curve signcryption in the authentication mechanism reduces the computational cost and communication overhead by a significant amount. |
topic |
smart card security elliptic curve cryptography authentication signcryption protocol |
url |
https://www.mdpi.com/2076-3417/10/22/8291 |
work_keys_str_mv |
AT anujkumarsingh ellipticcurvesigncryptionbasedmutualauthenticationprotocolforsmartcards AT arunsolanki ellipticcurvesigncryptionbasedmutualauthenticationprotocolforsmartcards AT anandnayyar ellipticcurvesigncryptionbasedmutualauthenticationprotocolforsmartcards AT basitqureshi ellipticcurvesigncryptionbasedmutualauthenticationprotocolforsmartcards |
_version_ |
1724416955993030656 |