Skip to main content

An Improvement of Remote User Authentication Scheme Using Smart Cards

  • Conference paper
Mobile Ad-hoc and Sensor Networks (MSN 2006)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4325))

Included in the following conference series:

Abstract

In 2006, Manik et al. proposed a novel remote user authentication scheme using bilinear pairings. Chou et al. identified a weakness in Manik et al.’s scheme and improved the scheme. And besides, Thulasi et al. pointed that both Manik et al.’s and Chou et al.’s schemes are vulnerable to forgery attacks and replay attacks. In this paper, we analyze the previous schemes based on a timestamp and provide further comments and an improved scheme using a nonce. Our scheme also provides mutual authentication between a user and a remote server while the previous schemes only provided unilateral authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ateniese, G., Steiner, M., Tsudik, G.: New multiparty authentication services and key agreement protocols. IEEE Journal on Selected Areas in Communication 18, 628–639 (2000)

    Article  Google Scholar 

  2. Sun, H.M., Li, L.H.: An efficient remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 46, 958–961 (2000)

    Article  Google Scholar 

  3. Lamport, L.: Password authentication with insecure communication. Communication of ACM 24, 770–772 (1981)

    Article  Google Scholar 

  4. Hwang, M.S., Li, L.H.: A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 46, 28–30 (2000)

    Article  Google Scholar 

  5. Das, M.L., Saxena, A., Gulati, V.P., Phatak, D.B.: A novel remote user authen-tication scheme using bilinear pairings. Computers & Security 25, 184–189 (2006)

    Article  Google Scholar 

  6. Chou, J.S., Chen, Y., Lin, J.Y.: Improvement of Manik et al ’s remote user authentication scheme, http://eprint.iacr.org/2005/450.pdf

  7. Goriparthi, T., Das, M.L., Negi, A., Saxena, A.: Cryptanalysis of re-cently proposed Remote User Authentication Schemes, http://eprint.iacr.org/2006/28.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jeon, JC., Kang, BH., Kim, SM., Lee, WS., Yoo, KY. (2006). An Improvement of Remote User Authentication Scheme Using Smart Cards. In: Cao, J., Stojmenovic, I., Jia, X., Das, S.K. (eds) Mobile Ad-hoc and Sensor Networks. MSN 2006. Lecture Notes in Computer Science, vol 4325. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11943952_35

Download citation

  • DOI: https://doi.org/10.1007/11943952_35

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-49932-9

  • Online ISBN: 978-3-540-49933-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics