An efficient user-to-user authentication scheme in peer-to-peer system

Ziming Zhao, Yan Fei Liu, Hui Li, Yi Xian Yang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

In peer-to-peer environment, information is directly exchanged between nodes instead of forwarding by a central server, hence user-to-user authentication becomes a critical security issue in such environment. Existing solutions are based on public-key cryptosystem. The main concerns in a public-key cryptosystem include authenticity of the public key and lack of efficiency. A trusted third party is also involved in a public-key environment. This paper proposed an efficient one-way hash function based user-to-user authentication scheme with smart card in peer-to-peer system. In the proposed scheme, the system and peers do not have to maintain verification tables, and a trusted third party is not needed in the run time. The proposed scheme achieves mutual authentication at very low computational cost, but also provides good security strength.

Original languageEnglish (US)
Title of host publicationProceedings - The 1st International Conference on Intelligent Networks and Intelligent Systems, ICINIS 2008
Pages263-266
Number of pages4
DOIs
StatePublished - Dec 1 2008
Externally publishedYes
Event1st International Conference on Intelligent Networks and Intelligent Systems, ICINIS 2008 - Wuhan, China
Duration: Nov 1 2008Nov 3 2008

Other

Other1st International Conference on Intelligent Networks and Intelligent Systems, ICINIS 2008
CountryChina
CityWuhan
Period11/1/0811/3/08

Fingerprint

Authentication
Cryptography
Smart cards
Hash functions
Servers
Costs

Keywords

  • Mutual authentication
  • One-way hash function
  • Peer-to-peer
  • Smart card

ASJC Scopus subject areas

  • Artificial Intelligence
  • Information Systems

Cite this

Zhao, Z., Liu, Y. F., Li, H., & Yang, Y. X. (2008). An efficient user-to-user authentication scheme in peer-to-peer system. In Proceedings - The 1st International Conference on Intelligent Networks and Intelligent Systems, ICINIS 2008 (pp. 263-266). [4683216] https://doi.org/10.1109/ICINIS.2008.142

An efficient user-to-user authentication scheme in peer-to-peer system. / Zhao, Ziming; Liu, Yan Fei; Li, Hui; Yang, Yi Xian.

Proceedings - The 1st International Conference on Intelligent Networks and Intelligent Systems, ICINIS 2008. 2008. p. 263-266 4683216.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Zhao, Z, Liu, YF, Li, H & Yang, YX 2008, An efficient user-to-user authentication scheme in peer-to-peer system. in Proceedings - The 1st International Conference on Intelligent Networks and Intelligent Systems, ICINIS 2008., 4683216, pp. 263-266, 1st International Conference on Intelligent Networks and Intelligent Systems, ICINIS 2008, Wuhan, China, 11/1/08. https://doi.org/10.1109/ICINIS.2008.142
Zhao Z, Liu YF, Li H, Yang YX. An efficient user-to-user authentication scheme in peer-to-peer system. In Proceedings - The 1st International Conference on Intelligent Networks and Intelligent Systems, ICINIS 2008. 2008. p. 263-266. 4683216 https://doi.org/10.1109/ICINIS.2008.142
Zhao, Ziming ; Liu, Yan Fei ; Li, Hui ; Yang, Yi Xian. / An efficient user-to-user authentication scheme in peer-to-peer system. Proceedings - The 1st International Conference on Intelligent Networks and Intelligent Systems, ICINIS 2008. 2008. pp. 263-266
@inproceedings{58712c9881674296b82832df1fae2c53,
title = "An efficient user-to-user authentication scheme in peer-to-peer system",
abstract = "In peer-to-peer environment, information is directly exchanged between nodes instead of forwarding by a central server, hence user-to-user authentication becomes a critical security issue in such environment. Existing solutions are based on public-key cryptosystem. The main concerns in a public-key cryptosystem include authenticity of the public key and lack of efficiency. A trusted third party is also involved in a public-key environment. This paper proposed an efficient one-way hash function based user-to-user authentication scheme with smart card in peer-to-peer system. In the proposed scheme, the system and peers do not have to maintain verification tables, and a trusted third party is not needed in the run time. The proposed scheme achieves mutual authentication at very low computational cost, but also provides good security strength.",
keywords = "Mutual authentication, One-way hash function, Peer-to-peer, Smart card",
author = "Ziming Zhao and Liu, {Yan Fei} and Hui Li and Yang, {Yi Xian}",
year = "2008",
month = "12",
day = "1",
doi = "10.1109/ICINIS.2008.142",
language = "English (US)",
isbn = "9780769533919",
pages = "263--266",
booktitle = "Proceedings - The 1st International Conference on Intelligent Networks and Intelligent Systems, ICINIS 2008",

}

TY - GEN

T1 - An efficient user-to-user authentication scheme in peer-to-peer system

AU - Zhao, Ziming

AU - Liu, Yan Fei

AU - Li, Hui

AU - Yang, Yi Xian

PY - 2008/12/1

Y1 - 2008/12/1

N2 - In peer-to-peer environment, information is directly exchanged between nodes instead of forwarding by a central server, hence user-to-user authentication becomes a critical security issue in such environment. Existing solutions are based on public-key cryptosystem. The main concerns in a public-key cryptosystem include authenticity of the public key and lack of efficiency. A trusted third party is also involved in a public-key environment. This paper proposed an efficient one-way hash function based user-to-user authentication scheme with smart card in peer-to-peer system. In the proposed scheme, the system and peers do not have to maintain verification tables, and a trusted third party is not needed in the run time. The proposed scheme achieves mutual authentication at very low computational cost, but also provides good security strength.

AB - In peer-to-peer environment, information is directly exchanged between nodes instead of forwarding by a central server, hence user-to-user authentication becomes a critical security issue in such environment. Existing solutions are based on public-key cryptosystem. The main concerns in a public-key cryptosystem include authenticity of the public key and lack of efficiency. A trusted third party is also involved in a public-key environment. This paper proposed an efficient one-way hash function based user-to-user authentication scheme with smart card in peer-to-peer system. In the proposed scheme, the system and peers do not have to maintain verification tables, and a trusted third party is not needed in the run time. The proposed scheme achieves mutual authentication at very low computational cost, but also provides good security strength.

KW - Mutual authentication

KW - One-way hash function

KW - Peer-to-peer

KW - Smart card

UR - http://www.scopus.com/inward/record.url?scp=58049151351&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=58049151351&partnerID=8YFLogxK

U2 - 10.1109/ICINIS.2008.142

DO - 10.1109/ICINIS.2008.142

M3 - Conference contribution

AN - SCOPUS:58049151351

SN - 9780769533919

SP - 263

EP - 266

BT - Proceedings - The 1st International Conference on Intelligent Networks and Intelligent Systems, ICINIS 2008

ER -