Password authentication with insecure communication
Communications of the ACM
Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme
ACM SIGOPS Operating Systems Review
A simple remote user authentication scheme
Mathematical and Computer Modelling: An International Journal
New directions in cryptography
IEEE Transactions on Information Theory
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
A new remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
An efficient remote use authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Cryptanalysis of a remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Security enhancement of an IC-card-based remote login mechanism
Computer Networks: The International Journal of Computer and Telecommunications Networking
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
Cryptanalysis of a remote user authentication scheme using smart cards
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A simple and efficient key exchange scheme against the smart card loss problem
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Hi-index | 0.98 |
In this paper, we propose an efficient and complete remote user authentication scheme using smart cards. Compared with other smart card-based schemes, our scheme achieves more functionality. The important merits include: (1) a dictionary of verification tables is not required to authenticate users; (2) users can choose their password freely; (3) mutual authentication is provided between the user and the remote system; (4) the communication cost and the computational cost are very low; (5) users can update their password after the registration phase; (6) a session key agreed by the user and the remote system is generated in every session; and (7) the nonce-based scheme does not require a timestamp to solve the serious time synchronization problem.