scispace - formally typeset
Open AccessJournal ArticleDOI

An efficient and complete remote user authentication scheme using smart cards

TLDR
This paper proposes an efficient and complete remote user authentication scheme using smart cards that achieves more functionality and does not require a timestamp to solve the serious time synchronization problem.
About
This article is published in Mathematical and Computer Modelling.The article was published on 2006-07-01 and is currently open access. It has received 52 citations till now. The article focuses on the topics: Mutual authentication & Password.

read more

Citations
More filters
Journal ArticleDOI

A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem

TL;DR: An enhanced remote user mutual authentication scheme that uses elliptic curve cryptography and identity-based cryptosystem with three-way challenge-response handshake technique that supports flawless mutual authentication of participants, agreement of session key and the leaked key revocation capability is proposed.
Proceedings ArticleDOI

Cryptanalysis of a Remote User Authentication Scheme Using Smart Cards

TL;DR: This paper gives a cryptanalysis of the Liaw et al. remote user authentication scheme and presents that the scheme is vulnerable and insecure against at least four kinds of attack, including the offline password guessing attack, two impersonation attacks, the intruder-in-the-middle attack and the denial-of-service attack.
Book

Information Computing and Applications

TL;DR: An improved remote user authentication scheme based on Diffie-Hellman key exchange protocol is proposed and analysis shows the scheme is secure not only to achieve mutual authentication, but also to generate a session key in the same time.
Journal ArticleDOI

A Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards

TL;DR: This paper presents an efficient and secure ID-based remote user authentication scheme using bilinear pairings that is suitable for a multi-server environment in distributed networks and is secure against existential forgery on adaptively chosen-message and ID attack in the random oracle model.
Journal ArticleDOI

A secure remote user mutual authentication scheme using smart cards

TL;DR: This paper proposes a secure remote user mutual authentication scheme using smart cards that achieves all security requirements and is more suitable for practical applications than other related schemes.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

A public key cryptosystem and a signature scheme based on discrete logarithms

TL;DR: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.
Journal ArticleDOI

Password authentication with insecure communication

TL;DR: A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system.
Book ChapterDOI

A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms

TL;DR: In this article, a new signature scheme is proposed together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem and the security of both systems relies on the difficulty of computing discrete logarithms over finite fields.
Journal ArticleDOI

A new remote user authentication scheme using smart cards

TL;DR: This work proposes a new remote user authentication scheme using smart cards based on the ElGamal's (1985) public key cryptosystem that can withstand message replaying attack.
Related Papers (5)