Remote user authentication using public information

被引:0
|
作者
Mitchell, CJ [1 ]
机构
[1] Univ London Royal Holloway & Bedford New Coll, Informat Secur Grp, Mobile VCE Res Gr, Egham TW20 0EX, Surrey, England
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A method for remote user authentication is proposed that requires only public information to be stored at the verifying host. Like the S/KEY scheme, the new technique uses only symmetric cryptography and is resistant to eavesdropping, but, unlike S/KEY, it is resistant to host impersonation attacks. The avoidance of asymmetric cryptographic techniques makes the scheme appropriate for low cost user authentication devices.
引用
收藏
页码:360 / 369
页数:10
相关论文
共 50 条
  • [1] Remote User Authentication Using a Voice Authentication System
    Kaman, Shilpa
    Swetha, K.
    Akram, Syed
    Varaprasad, G.
    [J]. INFORMATION SECURITY JOURNAL, 2013, 22 (03): : 117 - 125
  • [2] Continuous User Authentication Using Temporal Information
    Niinuma, Koichiro
    Jain, Anil K.
    [J]. BIOMETRIC TECHNOLOGY FOR HUMAN IDENTIFICATION VII, 2010, 7667
  • [3] Remote user authentication scheme with user anonymity
    Lee, WB
    Chen, HB
    Dow, CR
    [J]. SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 412 - 417
  • [4] Cryptanalysis of a Remote User Authentication Protocol Using Smart Cards
    Madhusudhan, R.
    Kumar, Rohith S.
    [J]. 2014 IEEE 8TH INTERNATIONAL SYMPOSIUM ON SERVICE ORIENTED SYSTEM ENGINEERING (SOSE), 2014, : 474 - 477
  • [5] Strong Remote User Authentication Scheme using Smart Cards
    Martinez-Pelaez, Rafael
    Rico-Novella, Francisco
    Satizabal, Cristina
    Pomykala, Jacek
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL NETWORK CONFERENCE (INC 2010), 2010, : 199 - 208
  • [6] Novel remote user authentication scheme using bilinear pairings
    Yang, Chen
    Ma, Wenping
    Wang, Xinmei
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 306 - +
  • [7] Security of a remote user authentication scheme using smart cards
    Yeh, HT
    Sun, HM
    Hsieh, BT
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (01) : 192 - 194
  • [8] A modified remote user authentication scheme using smart cards
    Shen, JJ
    Lin, CW
    Hwang, MS
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2003, 49 (02) : 414 - 416
  • [9] Cryptanalysis of a remote user authentication scheme using smart cards
    Huang Kai
    Ou Qingyu
    Wu Xiaoping
    Song Yexin
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4490 - 4493
  • [10] A remote user authentication scheme using bilinear pairings and ECC
    Jia, Zhongtian
    Zhang, Yuan
    Shao, Hua
    Lin, Yongzheng
    Wang, Jin
    [J]. ISDA 2006: SIXTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 2, 2006, : 1091 - +