Remote user authentication using public information

被引:0
|
作者
Mitchell, CJ [1 ]
机构
[1] Univ London Royal Holloway & Bedford New Coll, Informat Secur Grp, Mobile VCE Res Gr, Egham TW20 0EX, Surrey, England
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A method for remote user authentication is proposed that requires only public information to be stored at the verifying host. Like the S/KEY scheme, the new technique uses only symmetric cryptography and is resistant to eavesdropping, but, unlike S/KEY, it is resistant to host impersonation attacks. The avoidance of asymmetric cryptographic techniques makes the scheme appropriate for low cost user authentication devices.
引用
收藏
页码:360 / 369
页数:10
相关论文
共 50 条
  • [31] A simple remote user authentication scheme
    Hwang, MS
    Lee, CC
    Tang, YL
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2002, 36 (1-2) : 103 - 107
  • [32] Robust remote user authentication scheme
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    [J]. INFORMATION NETWORKING: NETWORKING TECHNOLOGIES FOR BROADBAND AND MOBILE NETWORKS, 2004, 3090 : 935 - 942
  • [33] Cryptanalysis of a remote user authentication scheme
    Wang, Bangju
    Zhang, Huanguo
    [J]. ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1699 - 1701
  • [34] A Secure Remote User Authentication Scheme
    Park, Ji-Hye
    Yim, Seong Jun
    Chang, Jik Hyun
    [J]. THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 368 - 373
  • [35] An efficient and complete remote user authentication scheme using smart cards
    Liaw, Horng-Twu
    Lin, Jiann-Fu
    Wu, Wei-Chen
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2006, 44 (1-2) : 223 - 228
  • [36] Study on a secure remote user authentication scheme using smart cards
    [J]. Won, D. (dhwon@security.re.kr), 1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Prof B.H.Kang's Office,, Australia (07):
  • [37] A secure remote user mutual authentication scheme using smart cards
    Karuppiah, Marimuthu
    Saravanan, R.
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (4-5) : 282 - 294
  • [38] Security bound enhancement of remote user authentication using smart card
    Madhusudhan, R.
    Hegde, Manjunath
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 36 : 59 - 68
  • [39] Improvements of a Remote User Password Authentication Scheme using Smart Card
    Shin, Kwang Cheul
    Huh, Won Whoi
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (04): : 119 - 126
  • [40] A new modified remote user authentication scheme using smart cards
    Zhong-hua Shen
    [J]. Applied Mathematics-A Journal of Chinese Universities, 2008, 23 : 371 - 376