Skip to main content

Further Improvement of Manik et al.’s Remote User Authentication Scheme Using Smart Cards

  • Conference paper
Frontiers of High Performance Computing and Networking – ISPA 2006 Workshops (ISPA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4331))

Abstract

In 2006, Manik et al. proposed a novel remote user authentication scheme using bilinear pairings. Chou et al. identified a weakness in this scheme and made improvements. In addition, Thulasi et al. noted that both Manik et al.’s and Chou et al.’s schemes are vulnerable to forgery and replay attacks. In this paper, we analyze the previous schemes based on a timestamp and provide further comments together with an improved scheme using a nonce.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lamport, L.: Password authentication with insecure communication. Communication of ACM 24, 770–772 (1981)

    Article  Google Scholar 

  2. Yoon, E.J., Yoo, K.Y.: More Efficient and Secure Remote User Authentication Scheme using smart cards. IEEE CS ICPADS, 73–77 (2005)

    Google Scholar 

  3. Sun, H.M., Li, L.H.: An efficient remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 46, 958–961 (2000)

    Article  Google Scholar 

  4. Hwang, M., Li, L.: A new remote user authentication scheme using smart cards. IEEE Trans Consumer Electronics 46, 28–30 (2000)

    Article  Google Scholar 

  5. Yang, W., Shieh, S.: Password authentication schemes with smart cards. Computers and Security 18, 727–733 (1999)

    Article  Google Scholar 

  6. Das, M.L., Saxena, A., Gulati, V.P., Phatak, D.B.: A novel remote user authentica-tion scheme using bilinear pairings. Computers & Security 25, 184–189 (2006)

    Article  Google Scholar 

  7. Chou, J.S., Chen, Y., Lin, J.Y.: Improvement of Manik et al.’s remote user authentication scheme, http://eprint.iacr.org/2005/450.pdf

  8. Goriparthi, T., Das, M.L., Negi, A., Saxena, A.: Cryptanalysis of recently proposed Remote User Authentication Schemes, http://eprint.iacr.org/2006/28.pdf

  9. Blake, I., Seroussi, G., Smart, N.: Elliptic curve in cryptography. Cambridge University Press, Cambridge (1999)

    Google Scholar 

  10. Al-Riyami, S.S.: Cryptographic Schemes based on Elliptic Curve Pairings. Ph.D Thesis, Uni-versity of London (2004)

    Google Scholar 

  11. Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  12. Smart, N.P.: An identity based authenticated key agreement protocol based on the Weil pairing. Electronics Letters 38, 630–632 (2002)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Oh, JB., Jeon, JC., Yoo, KY. (2006). Further Improvement of Manik et al.’s Remote User Authentication Scheme Using Smart Cards. In: Min, G., Di Martino, B., Yang, L.T., Guo, M., Rünger, G. (eds) Frontiers of High Performance Computing and Networking – ISPA 2006 Workshops. ISPA 2006. Lecture Notes in Computer Science, vol 4331. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11942634_7

Download citation

  • DOI: https://doi.org/10.1007/11942634_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-49860-5

  • Online ISBN: 978-3-540-49862-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics