Abstract
In 2006, Manik et al. proposed a novel remote user authentication scheme using bilinear pairings. Chou et al. identified a weakness in this scheme and made improvements. In addition, Thulasi et al. noted that both Manik et al.’s and Chou et al.’s schemes are vulnerable to forgery and replay attacks. In this paper, we analyze the previous schemes based on a timestamp and provide further comments together with an improved scheme using a nonce.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lamport, L.: Password authentication with insecure communication. Communication of ACM 24, 770–772 (1981)
Yoon, E.J., Yoo, K.Y.: More Efficient and Secure Remote User Authentication Scheme using smart cards. IEEE CS ICPADS, 73–77 (2005)
Sun, H.M., Li, L.H.: An efficient remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 46, 958–961 (2000)
Hwang, M., Li, L.: A new remote user authentication scheme using smart cards. IEEE Trans Consumer Electronics 46, 28–30 (2000)
Yang, W., Shieh, S.: Password authentication schemes with smart cards. Computers and Security 18, 727–733 (1999)
Das, M.L., Saxena, A., Gulati, V.P., Phatak, D.B.: A novel remote user authentica-tion scheme using bilinear pairings. Computers & Security 25, 184–189 (2006)
Chou, J.S., Chen, Y., Lin, J.Y.: Improvement of Manik et al.’s remote user authentication scheme, http://eprint.iacr.org/2005/450.pdf
Goriparthi, T., Das, M.L., Negi, A., Saxena, A.: Cryptanalysis of recently proposed Remote User Authentication Schemes, http://eprint.iacr.org/2006/28.pdf
Blake, I., Seroussi, G., Smart, N.: Elliptic curve in cryptography. Cambridge University Press, Cambridge (1999)
Al-Riyami, S.S.: Cryptographic Schemes based on Elliptic Curve Pairings. Ph.D Thesis, Uni-versity of London (2004)
Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Smart, N.P.: An identity based authenticated key agreement protocol based on the Weil pairing. Electronics Letters 38, 630–632 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Oh, JB., Jeon, JC., Yoo, KY. (2006). Further Improvement of Manik et al.’s Remote User Authentication Scheme Using Smart Cards. In: Min, G., Di Martino, B., Yang, L.T., Guo, M., Rünger, G. (eds) Frontiers of High Performance Computing and Networking – ISPA 2006 Workshops. ISPA 2006. Lecture Notes in Computer Science, vol 4331. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11942634_7
Download citation
DOI: https://doi.org/10.1007/11942634_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-49860-5
Online ISBN: 978-3-540-49862-9
eBook Packages: Computer ScienceComputer Science (R0)