An improved dos-resistant id-based password authentication scheme without using smart card

Fuxi Wen1, Xuelei Li1, Shenjun Cui1
1School of Mathematics, University of Jinan, Jinan, China

Tóm tắt

Từ khóa


Tài liệu tham khảo

L. Lamport. Password authenticated with insecure communication. Communications of the Association for Computing Machinery, 24(1981)11, 770–772.

H. S. Kim, S. W. Lee, and K. Y. Yoo. ID-based password authentication scheme using smart cards and fingerprints. ACM SIGOPS Operating Systems Review, 37(2003)4, 32–41.

X. F. Leng. Smart card application and security. Information Security Tech. Report, 14(2009)2, 36–45.

P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In Proceedings of 19th Annual International Cryptology Conference, California, USA, August 1999, 388–397.

T. S. Messerges, E. A. Dabbish, and R. H. Sloan. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(2002)5, 541–552.

S. K. Kim and M. G. Chung. More secure remote user authentication scheme. Computer Communications, 32(2009)6, 1018–1021.

M. S. Hwang, S. K. Chong, and T. Y. Chen. DoS-resistant ID-based password authentication scheme using smart cards. Journal of System and Software, 83 (2010)1, 163–172.

J. Xu, W. T. Zhu, and D. G. Feng. An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces, 31(2009)4, 723–728.

S. W. Lee, H. S. Kim, and K. Y. Yoo. Improvement of Chien et al.’s remote user authentication scheme using smart cards. Computer Standards & Interfaces, 27 (2005)2, 181–183.

N. Y. Lee and Y. C. Chiu. Improved remote authentication scheme with smart card. Computer Standards & Interfaces, 27(2005)2, 177–180.

H. S. Rhee, J. O. Kwon, and D. H. Lee. A remote user authentication scheme without using smart cards. Computer Standards & Interfaces, 31(2009)1, 6–13.

C. I. Fan, Y. C. Chan, and Z. K. Zhang. Robust remote authentication scheme with smart cards. Computers & Security, 24(2005)8, 619–628.

M. K. Khan and J. Zhang. Improving the security of a flexible biometrics remote user authentication scheme. Computer Standards & Interfaces, 29(2007)1, 82–85.

J. H. Yang and C. C. Chang. An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers & Security, 28(2009)3–4, 138–143.

D. Hankerson, A. Menezes, and S. Vanstone. Guide to elliptic curve cryptography. New York, USA, Springer-Verlag, 2004, 75–147.

N. Koblitz. Elliptic curve cryptosystem. Mathematics of Computation, 48(1987), 203–209.

V. S. Miller. Use of elliptic curves in cryptography. Proceedings of 5th Annual International Cryptology Conference, California, USA, August 1985, 417–426.

T. Aura, P. Nikander, and J. Leiwo. DoS-resistant authentication with client puzzles. In Proceedings of the Eighth International Workshop on Security Protocols, Cambridge, UK, April 2011, Lecture Notes in Computer Science (2133), 170–177.

D. E. Denning and G. M. Sacco. Timestamps in key distribution protocols. Communications of the Association for Computing Machinery, 24(1981)8, 533–536.

M. Bellare and B. Yee. Forward-security in private-key cryptography. In Topics in Cryptology-CT-RSA’2003, San Francisco, USA, 2003, Lecture Notes in Computer Science (2612), 1–18.