A dynamic ID-based remote user authentication scheme
Top Cited Papers
- 6 July 2004
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Consumer Electronics
- Vol. 50 (2), 629-631
- https://doi.org/10.1109/tce.2004.1309441
Abstract
Password-based authentication schemes are the most widely used techniques for remote user authentication. Many static ID-based remote user authentication schemes both with and without smart cards have been proposed. Most of the schemes do not allow the users to choose and change their passwords, and maintain a verifier table to verify the validity of the user login. In this paper we present a dynamic ID-based remote user authentication scheme using smart cards. Our scheme allows the users to choose and change their passwords freely, and do not maintain any verifier table. The scheme is secure against ID-theft, and can resist the reply attacks, forgery attacks, guessing attacks, insider attacks and stolen verifier attacks.Keywords
All Related Versions
This publication has 9 references indexed in Scilit:
- A remote user authentication scheme using smart cards with forward secrecyIEEE Transactions on Consumer Electronics, 2003
- A modified remote user authentication scheme using smart cardsIEEE Transactions on Consumer Electronics, 2003
- A remote user authentication scheme using hash functionsACM SIGOPS Operating Systems Review, 2002
- An ElGamal-like cryptosystem for enciphering large messagesIEEE Transactions on Knowledge and Data Engineering, 2002
- A flexible remote user authentication scheme using smart cardsACM SIGOPS Operating Systems Review, 2002
- An efficient remote use authentication scheme using smart cardsIEEE Transactions on Consumer Electronics, 2000
- Cryptanalysis of a remote user authentication scheme using smart cardsIEEE Transactions on Consumer Electronics, 2000
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- Password authentication with insecure communicationCommunications of the ACM, 1981