scispace - formally typeset
Proceedings ArticleDOI

Password based remote authentication scheme using ECC for smart card

TLDR
This paper proposes a Password based authentication scheme using ECC for smart card environment, without maintaining the password table by the server, which provides high security at a reasonable computational cost and restricts most of the current attacking mechanisms.
Abstract
Remote user authentication is a continual problem, particularly with mobile and handheld devices such as Personal Digital Assistants (PDAs), Smartcard, Laptops. Providing user authentication for safe access of precious, private information, or personalized services, for every system is difficult User authentication is the primary line of defence for a handheld device that falls into the hands of an unauthorized individual. Password or Personal Identification Number (PIN) based authentication is the leading mechanism for verifying the identity of actual device users. Remote authentication is the best solution for remote accessing in smart card environment. In this paper we propose a Password based authentication scheme using ECC for smart card environment, without maintaining the password table by the server. It provides high security at a reasonable computational cost. Furthermore it restricts most of the current attacking mechanisms. It is simple and can be adopted in any kind of lightweight devices.

read more

Citations
More filters
Journal Article

A Modified Remote User Authentication Scheme Using Smart Cards

TL;DR: A new remote user authentication scheme which is the modified form of the Shen-Lin-Hwang's scheme which can withstand attack that similar to Chan and Cheng's attack and Chang and Hwang' attack in registration phase and authentication phase is presented.
Journal ArticleDOI

Multilayer Consensus ECC-Based Password Authenticated Key-Exchange (MCEPAK) Protocol for Smart Grid System

TL;DR: This paper aims at providing a key agreement protocol for smart grid to cope with access control of appliances/ devices located inside a Home Area Network by a set of controllers outside the HAN with an Elliptic Curve Cryptography approach.
Journal ArticleDOI

Robust and flexible tunnel management for secure private cloud

TL;DR: A strong authentication with a key agreement scheme is proposed to establish the secure tunnel and the proposed framework also provides mutual authentication, session key renewal between the users and the cloud server.
References
More filters
Journal ArticleDOI

Limitations of challenge-response entity authentication

TL;DR: This work considers two basic versions of the challenge-response authentication protocol, and exhibits both a method of attack and a simple modification preventing such attacks.
Journal ArticleDOI

Efficient remote user authentication scheme based on generalized ElGamal signature scheme

TL;DR: An enhancement based on generalized ElGamal signature scheme to resolve problems of forgery attack and enables users to update their passwords freely without the help of a remote system, while also providing mutual authentication.
Journal ArticleDOI

An improvement of the Yang-Shieh password authentication schemes

TL;DR: This paper shall improve Yang and Shieh's schemes to resist Sun and Yeh's attack on timestamp-based password authentication schemes.
Journal ArticleDOI

A New Secure Remote User Authentication Scheme with Smart Cards

TL;DR: This paper presents a secure remote user authentication scheme with smart cards that provides the essential security requirements and achieves particular attributes.
Related Papers (5)