A Secure Key Authentication Scheme Based on the Hardness of Solving Elliptic Curve Discrete Logarithm Problem
- 1 Universiti Kebangsaan Malaysia, Malaysia
Copyright: © 2020 Izzmier Izzuddin Zulkepli and Eddie Shahril Ismail. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
A key authentication scheme is a scheme that protects a user’s public key from modification and counterfeiting by an adversary. The new development and improvement of key authentication schemes should be made continuously so that the systems are safe and practical to be used. To the best of our knowledge, there is no key authentication using the elliptic curve so far. Thus, in this paper, we propose the first secure elliptic curve-based key authentication scheme with its security, relying on the difficulty of solving the elliptic curve discrete logarithm problem. We show that the proposed scheme is secure against various defined cryptographic attacks such as public keyword modification and keyword guessing attacks. Next, we analyze the computational time complexity of the algorithms by computing the number of modular operations needed in these algorithms together with asymptotical analysis of running time using O(g(n)) notation. It turns out that our scheme requires the least amount of time complexity of 203.36Tmul + Th for user registration phase, 58.12Tmul for key authentication phase, and offers less running time compared to some existing key authentication schemes.
- 379 Views
- 134 Downloads
- 0 Citations
- Key Authentication Scheme
- Elliptic Curve
- Elliptic Curve Discrete Logarithm Problem