TY - GEN
T1 - Two efficient and secure authentication schemes using smart cards
AU - Lee, Youngsook
AU - Nam, Junghyun
AU - Kim, Seungjoo
AU - Won, Dongho
PY - 2006
Y1 - 2006
N2 - A mutual authentication scheme is a two-party protocol designed to allow the communicating parties to confirm each other's identity over a public, insecure network, Passwords provide the most convenient means of authentication because they are easy for humans to remember. Whilst there have been many proposals for password authentication, they are vulnerable to various attacks and are neither efficient, nor user friendly, In this paper we propose two new password authentication schemes making use of smart cards: the timestamp-based authentication scheme (TBAS) and the nonce-based authentication scheme (NBAS), Both TEAS and NBAS provide many desirable features: (1) they do not require the server to maintain a password table for verifying the legitimacy of login users; (2) they allow users to choose their passwords according to their liking and hence give more user convenience; (3) they are extremely efficient in terms of the computational cost since the protocol participants perform only a few hash function operations; and (4) they achieve mutual authentication between the remote user and the server. In addition, NBAS does not require synchronized clocks between the remote user and the server.
AB - A mutual authentication scheme is a two-party protocol designed to allow the communicating parties to confirm each other's identity over a public, insecure network, Passwords provide the most convenient means of authentication because they are easy for humans to remember. Whilst there have been many proposals for password authentication, they are vulnerable to various attacks and are neither efficient, nor user friendly, In this paper we propose two new password authentication schemes making use of smart cards: the timestamp-based authentication scheme (TBAS) and the nonce-based authentication scheme (NBAS), Both TEAS and NBAS provide many desirable features: (1) they do not require the server to maintain a password table for verifying the legitimacy of login users; (2) they allow users to choose their passwords according to their liking and hence give more user convenience; (3) they are extremely efficient in terms of the computational cost since the protocol participants perform only a few hash function operations; and (4) they achieve mutual authentication between the remote user and the server. In addition, NBAS does not require synchronized clocks between the remote user and the server.
KW - Authentication scheme
KW - Mutual authentication
KW - Password
KW - Smart card
UR - http://www.scopus.com/inward/record.url?scp=33745960098&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33745960098&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:33745960098
SN - 3540340793
SN - 9783540340799
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 858
EP - 866
BT - Computational Science and Its Applications - ICCSA 2006
PB - Springer Verlag
T2 - ICCSA 2006: International Conference on Computational Science and Its Applications
Y2 - 8 May 2006 through 11 May 2006
ER -