A Smart Card-based Authentication Scheme Using User Identify Cryptography

The user authentication scheme is a useful mechanism for verifying the legitimacy of a remote user over insecure network environments. Recently, smart card-based user authentication schemes have been used in a wide range of applications, such as Internet commerce, electronic mail system, and voice over Internet protocol. However, most existing authentication schemes cannot protect the privacy of the user’s identity. Therefore, the dynamic ID-based user authentication scheme is proposed to overcome this drawback. In this article, we analyze some security properties for recent dynamic ID-based user authentications. In addition, we propose an enhanced authentication scheme that can withstand the possible attacks and reduce the overhead of the system implementation.

[1]  Hung-Min Sun,et al.  An Efficient Remote User Authentication Scheme Using Smart Cards , 2000 .

[2]  Wei-Chi Ku,et al.  Impersonation Attack on a Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards , 2005, IEICE Trans. Commun..

[3]  M. Misbahuddin,et al.  A Novel Dynamic ID-Based Remote User Authentication Scheme , 2006, 2006 Annual IEEE India Conference.

[4]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[5]  Min-Shiang Hwang,et al.  A new remote user authentication scheme using smart cards , 2000, IEEE Trans. Consumer Electron..

[6]  David L. Mills,et al.  Adaptive hybrid clock discipline algorithm for the network time protocol , 1998, TNET.

[7]  Eun-Jun Yoon,et al.  More Efficient and Secure Remote User Authentication Scheme using Smart Cards , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).

[8]  Paul C. van Oorschot,et al.  Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..

[9]  Cheng-Chi Lee,et al.  A flexible remote user authentication scheme using smart cards , 2002, OPSR.

[10]  Chi-Kwong Chan,et al.  Cryptanalysis of a modified remote user authentication scheme using smart cards , 2003, IEEE Trans. Consumer Electron..

[11]  Ashutosh Saxena,et al.  A dynamic ID-based remote user authentication scheme , 2004, IEEE Transactions on Consumer Electronics.

[12]  Cheng-Chi Lee,et al.  Security enhancement for a dynamic ID-based remote user authentication scheme , 2005, International Conference on Next Generation Web Services Practices (NWeSP'05).

[13]  Jianhua Chen,et al.  Weaknesses of a Remote User Password Authentication Scheme Using Smart Card , 2011, Int. J. Netw. Secur..

[14]  Chien-Lung Hsu Security of Chien et al.'s remote user authentication scheme using smart cards , 2004, Comput. Stand. Interfaces.

[15]  Amit K. Awasthi Comment on A dynamic ID-based Remote User Authentication Scheme , 2004, ArXiv.

[16]  Muhammad Khurram Khan,et al.  Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme' , 2011, Comput. Commun..

[17]  Yan-yan Wang,et al.  A more efficient and secure dynamic ID-based remote user authentication scheme , 2009, Comput. Commun..

[18]  Zhong Chen,et al.  Further Improvement of An Authentication Scheme with User Anonymity for Wireless Communications , 2012, Int. J. Netw. Secur..

[19]  Muhammad Khurram Khan,et al.  Improving the security of 'a flexible biometrics remote user authentication scheme' , 2007, Comput. Stand. Interfaces.

[20]  Min-Shiang Hwang,et al.  A modified remote user authentication scheme using smart cards , 2003, IEEE Trans. Consumer Electron..

[21]  Chin-Chen Chang,et al.  Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards , 2003, Informatica.

[22]  Yaqing Tu,et al.  An improvement of dynamic ID-based remote user authentication scheme with smart cards , 2008, 2008 7th World Congress on Intelligent Control and Automation.

[23]  Lei Jiang,et al.  A Robust and Efficient Timestamp-based Remote User Authentication Scheme with Smart Card Lost Attack Resistance , 2013, Int. J. Netw. Secur..

[24]  Chun-I Fan,et al.  Robust remote authentication scheme with smart cards , 2005, Comput. Secur..

[25]  Jian Li,et al.  Improved Dynamic ID-Based Remote User Authentication Scheme Using Smart cards , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[26]  Manoj Kumar A New Secure Remote User Authentication Scheme with Smart Cards , 2010, Int. J. Netw. Secur..

[27]  Wei-Chi Ku,et al.  Further cryptanalysis of fingerprint-based remote user authentication scheme using smartcards , 2005 .

[28]  Yu-Hao Chuang,et al.  A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks , 2009, Inf. Sci..

[29]  Manoj Kumar,et al.  An Enhanced Remote User Authentication Scheme with Smart Card , 2010, Int. J. Netw. Secur..

[30]  David L. Mills,et al.  Precision synchronization of computer network clocks , 1994, CCRV.

[31]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[32]  Min Gyo Chung,et al.  More secure remote user authentication scheme , 2009, Comput. Commun..

[33]  Kee-Young Yoo,et al.  Improved efficient remote user authentication scheme using smart cards , 2004, IEEE Transactions on Consumer Electronics.

[34]  Hung-Yu Chien,et al.  An Efficient and Practical Solution to Remote Authentication: Smart Card , 2002, Comput. Secur..

[35]  Kee-Young Yoo,et al.  Improvement of Chien et al.'s remote user authentication scheme using smart cards , 2005, Comput. Stand. Interfaces.

[36]  Paul Syverson,et al.  A Taxonomy of Replay Attacks , 1994 .

[37]  Chin-Chen Chang,et al.  A mutual authenticated key agreement scheme over insecure networks , 2007 .

[38]  Francisco Rico-Novella,et al.  Improvement of the dynamic ID-based remote user authentication scheme , 2010, 2010 International Conference on Information Society.