Enhancement of a timestamp-based password authentication scheme

被引:0
|
作者
School of Electronics and Information Engineering, Beijing University of Aeronautics and Astronautics, Beijing 100083, China [1 ]
机构
来源
Beijing Hangkong Hangtian Daxue Xuebao | 2007年 / 5卷 / 577-579期
关键词
Authentication - Information services - Servers;
D O I
暂无
中图分类号
学科分类号
摘要
Yang and Shieh have proposed a timestamp-based password authentication scheme using smart card. The weakness of Yang and Shieh's scheme is submitting password in plaintext and not authenticating key information center(KIC) by user. The new scheme improved the process of registration, login, authentication and update password. The user submitted the password's hash value instead of the password's plaintext, and shared the secret information with the KIC. Submitting the password's hash value is the same as password in authentication, and avoiding the password's exposure. With the secret information, the user can authenticate the KIC. The new scheme can overcome all of the above vulnerabilities, can resist the forged login attack and never revel the privacy of user even if the server is attacked.
引用
收藏
相关论文
共 50 条
  • [31] Analysis and Enhancement of a Password Authentication and Update Scheme Based on Elliptic Curve Cryptography
    Wang, Lili
    JOURNAL OF APPLIED MATHEMATICS, 2014,
  • [32] Timestamp-based Hot/Cold Data Identification Scheme for Solid State Drives
    Nguyen-Van Hiep
    Hsieh, Jen-Wei
    PROCEEDINGS OF THE 2018 CONFERENCE ON RESEARCH IN ADAPTIVE AND CONVERGENT SYSTEMS (RACS 2018), 2018, : 255 - 259
  • [33] Secure Timestamp-Based Mutual Authentication Protocol for IoT Devices Using RFID Tags
    Tewari, Aakanksha
    Gupta, Brij B.
    INTERNATIONAL JOURNAL ON SEMANTIC WEB AND INFORMATION SYSTEMS, 2020, 16 (03) : 20 - 34
  • [34] Selective Timestamp-Nonce Based Authentication Scheme
    Wu, Wei-Chen
    Liaw, Horng-Twu
    Chen, Yi-Ming
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (01): : 95 - 104
  • [35] Selective timestamp-nonce based authentication scheme
    Wu, W.-C. (wwu@hsc.edu.tw), 1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Prof B.H.Kang's Office,, Australia (07):
  • [36] Password Authentication Based on Fractal Coding Scheme
    Al-Saidi, Nadia M. G.
    Said, Mohamad Rushdan Md
    Othman, Wan Ainun M.
    JOURNAL OF APPLIED MATHEMATICS, 2012,
  • [37] A PASSWORD AUTHENTICATION SCHEME BASED ON DISCRETE LOGARITHMS
    WU, TC
    CHANG, CC
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 1991, 41 (1-2) : 31 - 38
  • [38] A compressed and dynamic-range-based expression of timestamp and period for timestamp-based schedulers
    Wei, D
    Ansari, N
    Chen, JG
    GLOBECOM '01: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2001, : 2353 - 2357
  • [39] A password authentication scheme with secure password updating
    Lin, CL
    Hwang, T
    COMPUTERS & SECURITY, 2003, 22 (01) : 68 - 72
  • [40] Timestamp-based registration protocol in mobile IP
    Wang, L.-M., 1600, Science Press (31):