A more efficient and secure dynamic ID-based remote user authentication scheme

被引:206
作者
Wang, Yan-yan [1 ]
Liu, Jia-yong [1 ]
Xiao, Feng-xia [1 ]
Dan, Jing [1 ]
机构
[1] Sichuan Univ, Inst Info Secur, Chengdu 610065, Peoples R China
关键词
Authentication; Password; Smart cards; Security analysis; SMART CARDS;
D O I
10.1016/j.comcom.2008.11.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In 2004, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme. This scheme allows users to change and choose passwords freely, and the server does not maintain any verifier table. It is also secure to against ID-theft, replay attacks and insider attacks and so on. However, research has been done to point that it is completely insecure for its independent of the password. Furthermore, it did not achieve mutual authentication and could not resist impersonate remote server attack. In this paper, an enhanced password authentication scheme which still keeps the merits of the original scheme was presented. Security analysis proved that the improved scheme is more secure and practical. (C) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:583 / 585
页数:3
相关论文
共 8 条
[1]  
[Anonymous], COMMUNICATIONS ACM
[2]  
Cheng-Chi Lee, 2002, Operating Systems Review, V36, P23, DOI 10.1145/583800.583803
[3]   A dynamic ID-based remote user authentication scheme [J].
Das, ML ;
Saxena, A ;
Gulati, VP .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) :629-631
[4]   A new remote user authentication scheme using smart cards [J].
Hwang, MS ;
Li, LH .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (01) :28-30
[5]   A simple remote user authentication scheme [J].
Hwang, MS ;
Lee, CC ;
Tang, YL .
MATHEMATICAL AND COMPUTER MODELLING, 2002, 36 (1-2) :103-107
[6]   Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards [J].
Ku, WC ;
Chen, SM .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (01) :204-207
[7]  
Lal S., 2005, SECURITY ANAL DYNAMI
[8]   An efficient remote use authentication scheme using smart cards [J].
Sun, HM .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (04) :958-961