[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

A flexible remote user authentication scheme using smart cards

Published: 01 July 2002 Publication History

Abstract

In 1999, Hwang and Li proposed a new user authentication scheme using smart cards. The scheme does not need any password or verification table. Later, Sun proposed an efficient remote use authentication scheme to improve the efficiency of the Hwang-Li scheme. However, these two schemes do not allow users to freely choose and change their passwords. In this article, we shall propose a simple and efficient remote user authentication scheme that allows users to freely choose and change their passwords without significantly increasing the computation cost.

References

[1]
C. C. Chang and W. Y. Liao, "A remote password authentication scheme based upon ElGamal's signature scheme," Computer & Security, vol. 13, no. 2, pp. 137-144, 1994.
[2]
C. C. Chang and T. C. Wu, "Remote password authentication with smart cards," IEE Proceedings-E, vol. 138, pp. 165-168, May 1991.
[3]
Hung-Yu Chien, Jinn-Ke Jan, and Yuh-Min Tseng, "A modified remote login authentication scheme based on geometric approach," The Journal of System and Software, vol. 55, pp. 287-290, 2001.
[4]
T. ElGamal, "A public-key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information Theory, vol. IT-31, pp. 469-472, July 1985.
[5]
Min-Shiang Hwang, "Cryptanalysis of remote login authentication scheme," Computer Communications, vol. 22, no. 8, pp. 742-744, 1999.
[6]
Min-Shiang Hwang and L. H. Li, "A new remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp. 28-30, 2000.
[7]
R. C. Merkle, "One-way hash functions and DES," in Advances in Cryptology, CRYPTO'89, pp. 428-446, Lecture Notes in Computer Science, Vol. 435, 1989.
[8]
M. Naor and M. Yung, "Universal one-way hash functions and their cryptographic applications," in Proc. of the 21st STOC, pp. 33-43, 1989.
[9]
Hung-Min Sun, "An efficient remote use authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, vol. 46, no. 4, pp. 958-961, 2000.
[10]
T. C. Wu, "Remote login authentication scheme based on a geometric approash," Computer Communications, vol. 18, no. 12, pp. 959-963, 1995.

Cited By

View all
  • (2021)Smart Authentication based on Modified Merkle Puzzles2021 IEEE Region 10 Symposium (TENSYMP)10.1109/TENSYMP52854.2021.9550956(1-7)Online publication date: 23-Aug-2021
  • (2021)Novel Authentication Process of the Smart Cards Using Face and Fingerprint RecognitionAdvances in Automation, Signal Processing, Instrumentation, and Control10.1007/978-981-15-8221-9_237(2547-2556)Online publication date: 5-Mar-2021
  • (2019)D-FAP: Dual-Factor Authentication Protocol for Mobile Cloud Connected DevicesJournal of Sensor and Actuator Networks10.3390/jsan90100019:1(1)Online publication date: 20-Dec-2019
  • Show More Cited By
  1. A flexible remote user authentication scheme using smart cards

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM SIGOPS Operating Systems Review
    ACM SIGOPS Operating Systems Review  Volume 36, Issue 3
    July 2002
    73 pages
    ISSN:0163-5980
    DOI:10.1145/567331
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 July 2002
    Published in SIGOPS Volume 36, Issue 3

    Check for updates

    Author Tags

    1. authentication
    2. cryptography
    3. password
    4. security

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 05 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)Smart Authentication based on Modified Merkle Puzzles2021 IEEE Region 10 Symposium (TENSYMP)10.1109/TENSYMP52854.2021.9550956(1-7)Online publication date: 23-Aug-2021
    • (2021)Novel Authentication Process of the Smart Cards Using Face and Fingerprint RecognitionAdvances in Automation, Signal Processing, Instrumentation, and Control10.1007/978-981-15-8221-9_237(2547-2556)Online publication date: 5-Mar-2021
    • (2019)D-FAP: Dual-Factor Authentication Protocol for Mobile Cloud Connected DevicesJournal of Sensor and Actuator Networks10.3390/jsan90100019:1(1)Online publication date: 20-Dec-2019
    • (2019)A Lightweight Two-Factor Authentication Scheme for Mobile Cloud ComputingProceedings of the 3rd International Conference on Future Networks and Distributed Systems10.1145/3341325.3342020(1-7)Online publication date: 1-Jul-2019
    • (2019)An Improved Two Factor User Authentication Framework Based on CAPTCHA and Visual Secret Sharing2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)10.1109/CSE/EUC.2019.00041(171-175)Online publication date: Aug-2019
    • (2019)An improved Chang-Lee’s smart card-based authentication schemeJournal of Physics: Conference Series10.1088/1742-6596/1237/4/0420441237(042044)Online publication date: 12-Jul-2019
    • (2018)An Improvement on Remote User Authentication Schemes Using Smart CardsComputers10.3390/computers70100097:1(9)Online publication date: 15-Jan-2018
    • (2018)The Weaknesses of the Virtual Password Authentication Protocol with CookieIOP Conference Series: Materials Science and Engineering10.1088/1757-899X/466/1/012009466(012009)Online publication date: 28-Dec-2018
    • (2018)An Improved Mutual Authentication Scheme with Smart Cards and Password under Trusted ComputingIOP Conference Series: Materials Science and Engineering10.1088/1757-899X/466/1/012008466(012008)Online publication date: 28-Dec-2018
    • (2017)Password Authenticated Key Exchange and Protected Password Change ProtocolsSymmetry10.3390/sym90801349:8(134)Online publication date: 28-Jul-2017
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media