A Robust and Efficient Password Authentication Scheme Using Smart Cards

Article Preview

Abstract:

Password authentication scheme using smart cards is an important part of securely accessing the server program. In 2012, Chen et al. proposed a robust smart-card-based remote user password authentication scheme. Recently, Li et al. discovered the scheme of Chen et al. cannot really ensure forward secrecy, and it cannot achieve the goal of efficiency for wrong password login. Then, they proposed an enhanced remote user password authentication scheme based on smart cards. In this paper, we propose a novel authentication scheme by using elliptic curve cryptography. The new scheme can achieve both the user anonymity and the goal of efficiency of incorrect password detection, and can also establish a session key for the subsequent secure communication. Moreover, we show by a detailed analysis that it requires lower computation cost while improving the security of the scheme.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1172-1175

Citation:

Online since:

June 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] R. Madhusudhan, R.C. Mittal: J. Netw. Comput. Appl. Vol. 35 (2012), p.1235.

Google Scholar

[2] S.K. Sood, A.K. Sarje and K. Singh, in: Proceedings of the third annual ACM Bangalore conference, Bangalore, Karnataka, India, (2010), p.5.

Google Scholar

[3] J. Xu, W.T. Zhu and D.G. Feng: Comput. Stand. Interf. Vol. 31 (2009), p.8.

Google Scholar

[4] B.L. Chen, W.C. Kuo and L.C. Wuu: Int. J. Commun. Syst. Vol. 27 (2014), p.377.

Google Scholar

[5] X. Li, J.W. Niu, M.K. Khan and J.G. Liao: J. Netw. Comput. Appl. Vol. 36 (2013), p.1365.

Google Scholar

[6] W.B. Hsieh, J.S. Leu: J. China Univ. Posts Telecommun. Vol. 31 (2012), p.791.

Google Scholar

[7] H.B. Tang, X.S. Liu and J. Lei: Int. J. Netw. Secur. Vol. 15 (2013), p.360.

Google Scholar

[8] S.H. Islam, G. P. Biswas: Math. Comput. Model. Vol. 57 (2013), p.2703.

Google Scholar

[9] N. Koblitz, A. Menezes and S. Vanstone, in: Towards a Quarter-Century of Public Key Cryptography, Springer US, (2000), p.103.

DOI: 10.1007/978-1-4757-6856-5_5

Google Scholar