scispace - formally typeset
Journal ArticleDOI

A new remote user authentication scheme using smart cards

Reads0
Chats0
TLDR
This work proposes a new remote user authentication scheme using smart cards based on the ElGamal's (1985) public key cryptosystem that can withstand message replaying attack.
Abstract
We propose a new remote user authentication scheme using smart cards. The scheme is based on the ElGamal's (1985) public key cryptosystem. Our scheme does not require a system to maintain a password table for verifying the legitimacy of the login users. In addition, our scheme can withstand message replaying attack.

read more

Citations
More filters
Journal ArticleDOI

An efficient biometrics-based remote user authentication scheme using smart cards

TL;DR: An efficient biometric-based remote user authentication scheme using smart cards, in which the computation cost is relatively low compared with other related schemes and the security is based on the one-way hash function, biometrics verification and smart card.
Journal ArticleDOI

An Efficient and Practical Solution to Remote Authentication: Smart Card

TL;DR: This work provides mutual authentication between the user and the server and achieves more functionality and requires much less computational cost than other smart card-based schemes.
Journal ArticleDOI

A secure dynamic ID based remote user authentication scheme for multi-server environment

TL;DR: The proposed scheme only uses hashing functions to implement a robust authentication scheme for the multi-server environment and provides a secure method to update password without the help of third trusted party.
Journal ArticleDOI

An efficient remote use authentication scheme using smart cards

TL;DR: This paper proposes an efficient and practical remote user authentication scheme using smart cards that provides the same advantages as that of Hwang and Li's scheme, but also significantly reduces the communication and computation costs.
Proceedings ArticleDOI

A dynamic user authentication scheme for wireless sensor networks

TL;DR: This paper proposes a dynamic strong-password based solution to this access control problem and adapt it into a wireless sensor network environment and discusses how to make use of the security features on MAC sublayer (medium access control) based on the IEEE 802.15.4 specification.
References
More filters
Journal ArticleDOI

A public key cryptosystem and a signature scheme based on discrete logarithms

TL;DR: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.
Journal ArticleDOI

Password authentication with insecure communication

TL;DR: A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system.
Book

A course in number theory

H. E. Rose
TL;DR: The central topics in number theory as taught in universities throughout the world are discussed in this paper, including divisibility and multiplicative functions, congruences and quadratic residues.
Proceedings ArticleDOI

Non-interactive password authentications without password tables

TL;DR: The authors propose a noninteractive password authentication scheme that discards the use of verification tables and can withstand the attack of replaying a previously intercepted login request.
Related Papers (5)