A novel user-participating authentication scheme

被引:14
作者
Chen, Tzung-Her [1 ]
Huang, Jyun-Ci [1 ]
机构
[1] Natl Chiayi Univ, Dept Comp Sci & Informat Engn, Chiayi 600, Taiwan
关键词
User participation; CAPTCHA; Visual secret sharing; User authentication; STRONG-PASSWORD AUTHENTICATION; SMART CARDS; VISUAL CRYPTOGRAPHY; INSECURE NETWORKS; EFFICIENT; ATTACKS; IMAGES; SAS;
D O I
10.1016/j.jss.2009.12.022
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
When utilizing services over public networks, a remote user authentication mechanism forms a first line of defense by rejecting illegal logins from unauthorized users. On-line applications over the Internet such as E-learning, on-line games, etc. are ever more common; remote user participation via networks plays a vital role in security and should be guaranteed. Without this countermeasure, malicious users are likely to enable agents to communicate with remote on-line systems. While existing remote user authentication schemes rarely address this issue, this paper highlights the problem of guaranteeing remote user participation. This proposed user authentication scheme benefits from combining CAPTCHA techniques and visual secret sharing to ensure deliberate human interaction. This scheme provides mutual authentication and is secure against certain known attacks, as well as low in computation cost. (C) 2009 Elsevier Inc. All rights reserved.
引用
收藏
页码:861 / 867
页数:7
相关论文
共 38 条
[1]   Threshold password authentication against guessing attacks in Ad hoc networks [J].
Chai, Zhenchuan ;
Cao, Zhenfu ;
Lu, Rongxing .
AD HOC NETWORKS, 2007, 5 (07) :1046-1054
[2]   An image intellectual property protection scheme for gray-level images using visual secret sharing strategy [J].
Chang, CC ;
Chuang, JC .
PATTERN RECOGNITION LETTERS, 2002, 23 (08) :931-941
[3]   Preventing Cheating in Computational Visual Cryptography [J].
Chang, Chin-Chen ;
Chen, Tzung-Her ;
Liu, Li-Jen .
FUNDAMENTA INFORMATICAE, 2009, 92 (1-2) :27-42
[4]  
Chen CM, 2002, IEICE T COMMUN, VE85B, P2519
[5]   Secure SAS-like password authentication schemes [J].
Chen, TH ;
Lee, WB ;
Horng, GB .
COMPUTER STANDARDS & INTERFACES, 2004, 27 (01) :25-31
[6]   A new method for using hash functions to solve remote user authentication [J].
Chen, Tzung-Her ;
Lee, Wei-Bin .
COMPUTERS & ELECTRICAL ENGINEERING, 2008, 34 (01) :53-62
[7]  
Chen TH, 2007, INFORMATICA-LITHUAN, V18, P27
[8]   An efficient and practical solution to remote authentication: Smart card [J].
Chien, HY ;
Jan, JK ;
Tseng, YM .
COMPUTERS & SECURITY, 2002, 21 (04) :372-375
[9]  
Hsu CL, 2004, COMP STAND INTER, V26, P167, DOI [10.1016/S0920-5489(03)00094-1, 10.1016/s0920-5489(03)00094-1]
[10]   A new remote user authentication scheme using smart cards [J].
Hwang, MS ;
Li, LH .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (01) :28-30