A remote user authentication scheme without using smart cards

被引:44
|
作者
Rhee, Hyun Sook [1 ]
Kwon, Jeong Ok [1 ]
Lee, Dong Hoon [1 ]
机构
[1] Korea Univ, Grad Sch Informat Secur CIST, Seoul 136701, South Korea
关键词
Cryptography; User authentication; Password; Smart card; SECURITY ENHANCEMENT; CRYPTANALYSIS;
D O I
10.1016/j.csi.2007.11.017
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
User authentication is one of the fundamental procedures to ensure Secure communications over an insecure public network channel. Especially, due to tamper-resistance and convenience in managing a password file, various user authentication schemes using smart cards have been proposed. A smart card however far from ubiquitous because of the high cost of a smart card and the infrastructure requirements. In this paper, we study secure user authentication using only a common storage device such as a universal serial bus (USB) memory, instead of using smart cards. We first show that the existing schemes using smart cards cannot be immediately converted into schemes using a common storage device. We then propose a practical and secure user authentication scheme, capable of supporting the use of the common storage device, which retains all the advantages of schemes using smart cards. (C) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:6 / 13
页数:8
相关论文
共 50 条
  • [42] A Biometrics-Based Remote User Authentication Scheme Using Smart Cards
    Cui, Jianming
    Sui, Rongquan
    Zhang, Xiaojun
    Li, Hengzhong
    Cao, Ning
    [J]. CLOUD COMPUTING AND SECURITY, PT IV, 2018, 11066 : 531 - 542
  • [43] Iris-based remote user authentication scheme using smart cards
    Sun, Hong-Wei
    Lam, Kwok-Yan
    Gu, Ming
    Sun, Jia-Guang
    [J]. 2007 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS; VOL 2: SIGNAL PROCESSING, COMPUTATIONAL INTELLIGENCE, CIRCUITS AND SYSTEMS, 2007, : 476 - +
  • [44] Further cryptanalysis of 'A user friendly remote user authentication scheme with smart cards'
    Khan, Muhammad Khurram
    [J]. ICIET 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND EMERGING TECHNOLOGIES, 2007, : 101 - 105
  • [45] Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards
    He, Debiao
    Wang, Ding
    Wu, Shuhua
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (02): : 170 - 177
  • [46] Cryptanalysis of a fingerprint-based remote user authentication scheme using smart cards
    Hsieh, BT
    Yeh, HT
    Sun, HM
    Lin, CT
    [J]. 37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 349 - 350
  • [47] Security Enhancement on an Improvement on Two Remote User Authentication Scheme Using Smart Cards
    Hsiang, HanCheng
    Chen, TienHo
    Shih, WeiKuan
    [J]. COMMUNICATION AND NETWORKING, 2009, 56 : 65 - +
  • [48] An efficient biometrics-based remote user authentication scheme using smart cards
    Li, Chun-Ta
    Hwang, Min-Shiang
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2010, 33 (01) : 1 - 5
  • [49] Security Enhancement on the Efficient and Complete Remote User Authentication Scheme using smart Cards
    Lee, Young Sil
    Kim, Tae Yong
    Lee, Hoon Jae
    [J]. 2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 702 - 706
  • [50] Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
    Wang, Xiao-Min
    Zhang, Wen-Fang
    Zhang, Jia-Shu
    Khan, Muhammad Khurram
    [J]. COMPUTER STANDARDS & INTERFACES, 2007, 29 (05) : 507 - 512