scispace - formally typeset
Proceedings ArticleDOI

Password-Based Access Control Scheme with Remote User Authentication Using Smart Cards

Reads0
Chats0
TLDR
The novel technique of binding one user's private key to his identity is taken, which enables the AS (authentication server) to be unnecessary to maintain a password table to verify the login request and thus enhances the practicality and reliability of the system.
Abstract
In this paper, a bilinear mapping based password-based access control scheme with remote user authentication scheme using smart cards is presented. The proposed scheme enables one user to choose his password freely in the registration phase and easily change it as needed. We take the novel technique of binding one user's private key to his identity, which enables the AS (authentication server) to be unnecessary to maintain a password table to verify the login request and thus enhances the practicality and reliability of the system. Additionally, based on the difficulty of Elliptic Curve Discrete Logarithm (ECDL) problem, the proposed scheme can efficiently withstand replaying attacks, forgery attacks, Masquerade attacks, guessing and stolen verifier attacks and insider attacks.

read more

Citations
More filters
Journal Article

A secure remote authentication scheme preserving user anonymity with non-tamper resistant smart cards

TL;DR: It is shown that Hu et al.'s scheme still cannot preserve user anonymity under their assumption and is also vulnerable to the offline password guessing attack, and an improvement is presented to overcome these weaknesses.
Proceedings ArticleDOI

Bilinear-pairing-based remote user authentication schemes using smart cards

TL;DR: This paper presents a detailed review of remote user authentication schemes with smart cards based on bilinear pairings, and proposes a scheme which is designed in such a way that it could ensure all sorts of facilities needed forremote user authentication procedure and could resist all types of known attacks.
Patent

Variable image presentation for authenticating a user

TL;DR: In this paper, a user predefines authenticators of one or more types and associates these with graphical images, which are then presented to the user to authenticate with the device, based on input received from the user and based further on the authenticator associated with the selected graphical image.
Journal Article

Survey on Biometric Applications for Implementation of Authentication in Smart Governance

Sumita Sarkar, +1 more
- 01 Oct 2013 - 
TL;DR: This study carried out a thorough study over some eminent existing biometric technique based smart card authentication schemes using smart cards to pave a way towards the evolution of an ideal authentication scheme that can attain every possible goals.
Proceedings ArticleDOI

Universal Physical Access Control System

TL;DR: This article proposes the Universal Physical Access Control System (UPACS) which provides a universal framework for controlling access to physical resources and shows how it can be used to control access to any type of resource, including homes, vehicles and public infrastructure.
References
More filters
Journal ArticleDOI

Password authentication with insecure communication

TL;DR: A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system.
Journal ArticleDOI

A new remote user authentication scheme using smart cards

TL;DR: This work proposes a new remote user authentication scheme using smart cards based on the ElGamal's (1985) public key cryptosystem that can withstand message replaying attack.
Journal ArticleDOI

A dynamic ID-based remote user authentication scheme

TL;DR: This paper presents a dynamic ID-based remote user authentication scheme using smart cards that allows the users to choose and change their passwords freely, and do not maintain any verifier table.
Journal ArticleDOI

Cryptanalysis of a remote user authentication scheme using smart cards

TL;DR: A cryptanalysis of a remote user authentication scheme proposed by Hwang and Li is presented and it is shown that Hwang-Li's scheme is breakable.
Journal ArticleDOI

A novel remote user authentication scheme using bilinear pairings

TL;DR: A remote user authentication scheme using the properties of bilinear pairings is presented, which prohibits the scenario of many logged in users with the same login-ID, and provides a flexible password change option to the registered users without any assistance from the remote system.
Related Papers (5)
Trending Questions (1)
How to Change Social Club password without email?

The proposed scheme enables one user to choose his password freely in the registration phase and easily change it as needed.