http://iet.metastore.ingenta.com
1887

A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card

A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Password authentication has been widely used in computer networks to provide secure remote access control. In this study, the authors show that the improved password authentication and update scheme based on elliptic curve cryptography proposed by Islam and Biswas is vulnerable to offline password guessing, stolen-verifier and insider attacks. We propose an advanced smart card-based password authentication and update scheme and extend the scheme to provide the privacy of the client. By comparing the criteria with other related schemes, our scheme not only solves several hard security threats but also satisfies more functionality features.

References

    1. 1)
      • C.T. Li , C.C. Lee , L.J. Wang , C.J. Liu . A secure billing service with two-factor user authentication in wireless sensor networks. Int. J. Innov. Comput., Inf. Control , 8 , 4821 - 4831
    2. 2)
    3. 3)
      • C.T. Li , C.C. Lee . A robust remote user authentication scheme using smart card. Inf. Technol. Control , 3 , 236 - 245
    4. 4)
    5. 5)
      • J.J. Hwang , T.C. Yeh . Improvement on Peyravian–unic's password authentication schemes. IEICE Trans. Commun. , 4 , 823 - 825
    6. 6)
    7. 7)
    8. 8)
    9. 9)
    10. 10)
    11. 11)
    12. 12)
    13. 13)
      • C.T. Li . Secure smart card based password authentication scheme with user anonymity. Inf. Technol. Control , 2 , 157 - 162
    14. 14)
    15. 15)
    16. 16)
    17. 17)
      • Kocher, P., Jaffe, J., Jun, B.: `Differential power analysis', Proc. Advances in Cryptology, 1999, p. 388–397.
    18. 18)
    19. 19)
    20. 20)
      • S.H. Islam , G.P. Biswas . Design of improved password authentication and update scheme based on elliptic curve cryptography. Math. Comput. Model.
    21. 21)
      • D. Hankerson , A. Menezes , S. Vanstone . (2004) Guide to elliptic curve cryptography.
    22. 22)
      • (2002) National Institute of Standards and Technology: US department of commerce, secure hash standard.
    23. 23)
      • (2001) National Institute of Standards and Technology: US department of commerce, advanced encryption standard.
    24. 24)
    25. 25)
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2012.0058
Loading

Related content

content/journals/10.1049/iet-ifs.2012.0058
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address