An efficient and complete remote user authentication scheme using smart cards
TLDR
This paper proposes an efficient and complete remote user authentication scheme using smart cards that achieves more functionality and does not require a timestamp to solve the serious time synchronization problem.About:
This article is published in Mathematical and Computer Modelling.The article was published on 2006-07-01 and is currently open access. It has received 52 citations till now. The article focuses on the topics: Mutual authentication & Password.read more
Citations
More filters
Journal ArticleDOI
A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
SK Hafizul Islam,G. P. Biswas +1 more
TL;DR: An enhanced remote user mutual authentication scheme that uses elliptic curve cryptography and identity-based cryptosystem with three-way challenge-response handshake technique that supports flawless mutual authentication of participants, agreement of session key and the leaked key revocation capability is proposed.
Proceedings ArticleDOI
Cryptanalysis of a Remote User Authentication Scheme Using Smart Cards
TL;DR: This paper gives a cryptanalysis of the Liaw et al. remote user authentication scheme and presents that the scheme is vulnerable and insecure against at least four kinds of attack, including the offline password guessing attack, two impersonation attacks, the intruder-in-the-middle attack and the denial-of-service attack.
Book
Information Computing and Applications
TL;DR: An improved remote user authentication scheme based on Diffie-Hellman key exchange protocol is proposed and analysis shows the scheme is secure not only to achieve mutual authentication, but also to generate a session key in the same time.
Journal ArticleDOI
A Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards
TL;DR: This paper presents an efficient and secure ID-based remote user authentication scheme using bilinear pairings that is suitable for a multi-server environment in distributed networks and is secure against existential forgery on adaptively chosen-message and ID attack in the random oracle model.
Journal ArticleDOI
A secure remote user mutual authentication scheme using smart cards
Marimuthu Karuppiah,R. Saravanan +1 more
TL;DR: This paper proposes a secure remote user mutual authentication scheme using smart cards that achieves all security requirements and is more suitable for practical applications than other related schemes.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI
A public key cryptosystem and a signature scheme based on discrete logarithms
TL;DR: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.
Journal ArticleDOI
Password authentication with insecure communication
TL;DR: A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system.
Book ChapterDOI
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
TL;DR: In this article, a new signature scheme is proposed together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem and the security of both systems relies on the difficulty of computing discrete logarithms over finite fields.
Journal ArticleDOI
A new remote user authentication scheme using smart cards
Min-Shiang Hwang,Li-Hua Li +1 more
TL;DR: This work proposes a new remote user authentication scheme using smart cards based on the ElGamal's (1985) public key cryptosystem that can withstand message replaying attack.