Enhancement of a timestamp-based password authentication scheme

被引:0
|
作者
School of Electronics and Information Engineering, Beijing University of Aeronautics and Astronautics, Beijing 100083, China [1 ]
机构
来源
Beijing Hangkong Hangtian Daxue Xuebao | 2007年 / 5卷 / 577-579期
关键词
Authentication - Information services - Servers;
D O I
暂无
中图分类号
学科分类号
摘要
Yang and Shieh have proposed a timestamp-based password authentication scheme using smart card. The weakness of Yang and Shieh's scheme is submitting password in plaintext and not authenticating key information center(KIC) by user. The new scheme improved the process of registration, login, authentication and update password. The user submitted the password's hash value instead of the password's plaintext, and shared the secret information with the KIC. Submitting the password's hash value is the same as password in authentication, and avoiding the password's exposure. With the secret information, the user can authenticate the KIC. The new scheme can overcome all of the above vulnerabilities, can resist the forged login attack and never revel the privacy of user even if the server is attacked.
引用
收藏
相关论文
共 50 条
  • [21] Attacks on the shen et al.'s timestamp-based password authentication scheme using smart cards
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (01) : 319 - 321
  • [22] Security Enhancements of an Improved Timestamp-Based Remote User Authentication Scheme
    An, Younghwa
    COMPUTER APPLICATIONS FOR SECURITY, CONTROL AND SYSTEM ENGINEERING, 2012, 339 : 54 - 61
  • [23] A TIMESTAMP-BASED CACHE COHERENCE SCHEME
    MIN, SL
    BAER, JL
    PROCEEDINGS OF THE 1989 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING, VOL 1: ARCHITECTURE, 1989, : I23 - I32
  • [24] Security analysis of timestamp-based remote user authentication scheme using smart cards
    Wei, Yong-Zhuang
    Hu, Yu-Pu
    2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 1580 - +
  • [25] Improvement on timestamp-based user authentication scheme with smart card lost attack resistance
    Wijayanto, Heri
    Hwang, Min-Shiang
    International Journal of Network Security, 2015, 17 (02) : 160 - 164
  • [26] Cryptanalysis and Enhancement of a Password-Based Authentication Scheme
    Eldefrawy, Mohamed H.
    Al-Muhtadi, Jalal F.
    2015 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2015, : 548 - 551
  • [27] A secure and timestamp-based communication scheme for cloud environment
    Salim, Abu
    Tripathi, Sachin
    Tiwari, Rajesh Kumar
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (04) : 319 - 332
  • [28] TIMESTAMP-BASED ORPHAN ELIMINATION
    HERLIHY, MP
    MCKENDRY, MS
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1989, 15 (07) : 825 - 831
  • [29] Commit Phase in Timestamp-based STM
    Zhang, Rui
    Budimlic, Zoran
    Scherer, William N., III
    SPAA'08: PROCEEDINGS OF THE TWENTIETH ANNUAL SYMPOSIUM ON PARALLELISM IN ALGORITHMS AND ARCHITECTURES, 2008, : 326 - 335
  • [30] Timestamp-based Application Fingerprinting in NTFS
    Galhuber, Michael
    Luh, Robert
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,