A New Remote User Authentication Scheme on Three Dimensions

Article Preview

Abstract:

The authors present a new remote user authentication scheme on three dimensions for multi-server environments. The merits include: the scheme can be used in multi-server environments; the system does not need to maintain any verification table; the users who have registered with various servers do not need to remember different login passwords for each; the ability to choose passwords freely and change them offline; mutual authentication is provided between the user and the remote system; a session key agreed by the user and the remote system is generated in every session. Furthermore, we propose a specific Access Right (AR). The AR means the legal users have different level of authorization based on which server in the multi-server environment in used.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 846-847)

Pages:

1707-1710

Citation:

Online since:

November 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Lamport, L.: Password authentication with insecure communication. Communications of the ACM, vol. 24, pp.770-772 (1981).

DOI: 10.1145/358790.358797

Google Scholar

[2] Chien, H. Y., Jan, J. K. and Tseng, Y. M.: An efficient and practical solution to remote authentication Smart Card. Computers and Security, vol. 21, no. 4, pp.372-375 (2002).

DOI: 10.1016/s0167-4048(02)00415-7

Google Scholar

[3] Hwang, M. S., Lee, C. C. and Tang, Y. L.: A simple remote user authentication scheme. Mathematical and Computer Modelling, vol. 36, pp.103-107 (2002).

DOI: 10.1016/s0895-7177(02)00106-1

Google Scholar

[4] Ku, W. C. and Chen, S. M.: Weaknesses and Improvements of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards. IEEE Transactions on Consumer Electronics, vol. 50, no. 1, pp.204-207, (2004).

DOI: 10.1109/tce.2004.1277863

Google Scholar

[5] Liaw, H. T., Lin, J. F. and Wu, W. C.: An efficient and complete remote user authentication scheme using smart cards. Mathematical and Computer Modelling, Volume 44, Issues 1-2, pp.223-228. (2006).

DOI: 10.1016/j.mcm.2006.01.015

Google Scholar

[6] Liaw, H. T., Fan, S. W. and Wu, W. C.: A Simple Password Authentications Using Polynomial. ACM Operating Systems Review, Vol. 38, No. 4, pp.74-79 (2004).

DOI: 10.1145/1031154.1031163

Google Scholar

[7] Sun, H. M.: An efficient remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, vol. 46, no. 4, pp.958-961(2000).

DOI: 10.1109/30.920446

Google Scholar

[8] Wang, S. J. and Chang, J. F.: Smart Card Based Secure Password Authentication Scheme. Computers and Security, vol. 15, no. 3, pp.231-237 (1996).

DOI: 10.1016/0167-4048(96)00005-3

Google Scholar

[9] Yang, W. H. and Shieh, S. P.: Password authentication schemes with smart cards. Computers and Security, vol. 18, no. 8, pp.727-733 (1999).

DOI: 10.1016/s0167-4048(99)80136-9

Google Scholar

[10] ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, vol. 31, no. 4, pp.469-472 (1985).

DOI: 10.1109/tit.1985.1057074

Google Scholar