Proceedings ArticleDOI
Password-Based Access Control Scheme with Remote User Authentication Using Smart Cards
Chen Yang,Wenping Ma,Benxiong Huang,Xinmei Wang +3 more
- Vol. 2, pp 448-452
Reads0
Chats0
TLDR
The novel technique of binding one user's private key to his identity is taken, which enables the AS (authentication server) to be unnecessary to maintain a password table to verify the login request and thus enhances the practicality and reliability of the system.Abstract:
In this paper, a bilinear mapping based password-based access control scheme with remote user authentication scheme using smart cards is presented. The proposed scheme enables one user to choose his password freely in the registration phase and easily change it as needed. We take the novel technique of binding one user's private key to his identity, which enables the AS (authentication server) to be unnecessary to maintain a password table to verify the login request and thus enhances the practicality and reliability of the system. Additionally, based on the difficulty of Elliptic Curve Discrete Logarithm (ECDL) problem, the proposed scheme can efficiently withstand replaying attacks, forgery attacks, Masquerade attacks, guessing and stolen verifier attacks and insider attacks.read more
Citations
More filters
Journal Article
A secure remote authentication scheme preserving user anonymity with non-tamper resistant smart cards
TL;DR: It is shown that Hu et al.'s scheme still cannot preserve user anonymity under their assumption and is also vulnerable to the offline password guessing attack, and an improvement is presented to overcome these weaknesses.
Proceedings ArticleDOI
Bilinear-pairing-based remote user authentication schemes using smart cards
TL;DR: This paper presents a detailed review of remote user authentication schemes with smart cards based on bilinear pairings, and proposes a scheme which is designed in such a way that it could ensure all sorts of facilities needed forremote user authentication procedure and could resist all types of known attacks.
Patent
Variable image presentation for authenticating a user
TL;DR: In this paper, a user predefines authenticators of one or more types and associates these with graphical images, which are then presented to the user to authenticate with the device, based on input received from the user and based further on the authenticator associated with the selected graphical image.
Journal Article
Survey on Biometric Applications for Implementation of Authentication in Smart Governance
Sumita Sarkar,Abhishek Roy +1 more
TL;DR: This study carried out a thorough study over some eminent existing biometric technique based smart card authentication schemes using smart cards to pave a way towards the evolution of an ideal authentication scheme that can attain every possible goals.
Proceedings ArticleDOI
Universal Physical Access Control System
Bassem Alhalabi,Clyde Carryl +1 more
TL;DR: This article proposes the Universal Physical Access Control System (UPACS) which provides a universal framework for controlling access to physical resources and shows how it can be used to control access to any type of resource, including homes, vehicles and public infrastructure.
References
More filters
Journal ArticleDOI
Password authentication with insecure communication
TL;DR: A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system.
Journal ArticleDOI
A new remote user authentication scheme using smart cards
Min-Shiang Hwang,Li-Hua Li +1 more
TL;DR: This work proposes a new remote user authentication scheme using smart cards based on the ElGamal's (1985) public key cryptosystem that can withstand message replaying attack.
Journal ArticleDOI
A dynamic ID-based remote user authentication scheme
TL;DR: This paper presents a dynamic ID-based remote user authentication scheme using smart cards that allows the users to choose and change their passwords freely, and do not maintain any verifier table.
Journal ArticleDOI
Cryptanalysis of a remote user authentication scheme using smart cards
Chi-Kwong Chan,Lee-Ming Cheng +1 more
TL;DR: A cryptanalysis of a remote user authentication scheme proposed by Hwang and Li is presented and it is shown that Hwang-Li's scheme is breakable.
Journal ArticleDOI
A novel remote user authentication scheme using bilinear pairings
TL;DR: A remote user authentication scheme using the properties of bilinear pairings is presented, which prohibits the scenario of many logged in users with the same login-ID, and provides a flexible password change option to the registered users without any assistance from the remote system.
Related Papers (5)
An improvement of dynamic ID-based remote user authentication scheme with smart cards
Zhengxian Gao,Yaqing Tu +1 more