An enhanced user authentication scheme for multi-server Internet services

被引:41
作者
Tsaur, WJ
Wu, CC
Lee, WB
机构
[1] Da Yeh Univ, Dept Informat Management, DaTsuen Changhua 51505, Taiwan
[2] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
关键词
Lagrange interpolating polynomial; password authentication; networks security; smart card;
D O I
10.1016/j.amc.2004.11.033
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In 2001, Tsaur proposed a smart card based password authentication scheme for multi-server Internet environments. It is the first scheme for password authentication in multi-server environments. Tsaur's scheme can verify a single password for logging in multiple authorized servers without using any password verification table at all, and emphasizes that any client can get service granted from multiple servers without repeating registration to every single server. One year later in 2002, Kim et al. pointed out that Tsaur's scheme cannot be secure against the off-line guessing attack. Nevertheless, Kim et al. did not propose any modification method. In this paper, we will show another weakness in Tsaur's scheme, and further give an improvement such that the above two weaknesses can be withstood accurately. (c) 2005 Elsevier Inc. All rights reserved.
引用
收藏
页码:258 / 266
页数:9
相关论文
共 10 条
  • [1] A new remote user authentication scheme using smart cards
    Hwang, MS
    Li, LH
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (01) : 28 - 30
  • [2] Cryptanalysis of flexible remote password authentication scheme of ICN'01
    Kim, S
    Lim, S
    Won, D
    [J]. ELECTRONICS LETTERS, 2002, 38 (24) : 1519 - 1520
  • [3] A remote password authentication scheme for multiserver architecture using neural networks
    Li, LH
    Lin, IC
    Hwang, MS
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS, 2001, 12 (06): : 1498 - 1504
  • [4] Menkus B., 1988, COMPUT SECUR, V7, P132, DOI [10.1016/0167-4048(88)90325-2, DOI 10.1016/0167-4048(88)90325-2]
  • [5] *NIST, 1984, 186 FIPS PUB NIST, P20
  • [6] HIGH SECURITY LOG-IN PROCEDURE
    PURDY, GB
    [J]. COMMUNICATIONS OF THE ACM, 1974, 17 (08) : 442 - 445
  • [7] RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI 10.1145/357980.358017
  • [8] An efficient remote use authentication scheme using smart cards
    Sun, HM
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (04) : 958 - 961
  • [9] Tsaur WJ, 2001, LECT NOTES COMPUT SC, V2093, P174
  • [10] A userfriendly remote authentication scheme with smart cards
    Wu, ST
    Chieu, BC
    [J]. COMPUTERS & SECURITY, 2003, 22 (06) : 547 - 550