Abstract
In 2005, Lu-Cao proposed an improvement on Hwang-Li’s remote user authentication scheme using a smart card that could withstand an impersonation attack, but also it required fewer computational costs. However, the current paper demonstrates that Lu-Cao’s scheme has some drawbacks. We present an improved authentication scheme in order to isolate such problems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lamport, L.: Password Authentication with Insecure Communication. Communications of the ACM 24(11), 770–772 (1981)
Hwang, M.S., Li, L.H.: A New Remote User Authentication Scheme Using Smart Cards. IEEE Trans. On Consumer Electronics. 46(1), 28–30 (2000)
Chan, C.K., Cheng, L.M.: Cryptanalysis of a Remote User Authentication Scheme Using Smart Cards. IEEE Trans. Consum. Electr. 46(4), 992–993 (2000)
Chang, C.C., Hwang, K.F.: Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards. Informatics 14(3), 289–294 (2003)
Shen, J.J., Lin, C.W., Hwang, M.S.: A Modified Remote User Authentication Scheme Using Smart Cards. IEEE Trans. Consum. Electr. 49(2), 414–416 (2003)
Leung, K.C., Cheng, L.M., Fong, A.S., Chan, C.K.: Cryptanalysis of a Modified Remote User Authentication Scheme Using Smart Cards. IEEE Trans. Consum. Electr. 49(4), 1243–1245 (2003)
Lu, R., Cao, Z.: Efficient Remote User Authentication Scheme Using Smart Card. Computer Networks 49, 535–540 (2005)
Ding, Y., Horster, P.: Undetectable Online Password Guessing Attacks. ACM Operating Systems Review 29(4), 77–86 (1995)
Cao, Z.F.: A Threshold Key Escrow Scheme based on Public Key Cryptosystem. Sci. China. 44(4), 441–448 (2001)
Rabin, M.O.: Digitalized Signature and Public Key Functions as Intractable as Factorization. Technical Report 212. MIT Laboratory for Computer Science (January 1979)
Needham, R.M., Schroeder, M.D.: Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM 21(12), 993–999 (1978)
Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptograph. CRC Press, New York (1997)
Aoskan, N., Debar, H., Steiner, M., Waidner, M.: Authentication Public Terminals. Computers Networks 31, 861–970 (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yoon, EJ., Yoo, KY. (2006). An Improved Lu-Cao’s Remote User Authentication Scheme Using Smart Card. In: Atzeni, A.S., Lioy, A. (eds) Public Key Infrastructure. EuroPKI 2006. Lecture Notes in Computer Science, vol 4043. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11774716_4
Download citation
DOI: https://doi.org/10.1007/11774716_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-35151-1
Online ISBN: 978-3-540-35152-8
eBook Packages: Computer ScienceComputer Science (R0)