Enhancement of a timestamp-based password authentication scheme

被引:0
|
作者
School of Electronics and Information Engineering, Beijing University of Aeronautics and Astronautics, Beijing 100083, China [1 ]
机构
来源
Beijing Hangkong Hangtian Daxue Xuebao | 2007年 / 5卷 / 577-579期
关键词
Authentication - Information services - Servers;
D O I
暂无
中图分类号
学科分类号
摘要
Yang and Shieh have proposed a timestamp-based password authentication scheme using smart card. The weakness of Yang and Shieh's scheme is submitting password in plaintext and not authenticating key information center(KIC) by user. The new scheme improved the process of registration, login, authentication and update password. The user submitted the password's hash value instead of the password's plaintext, and shared the secret information with the KIC. Submitting the password's hash value is the same as password in authentication, and avoiding the password's exposure. With the secret information, the user can authenticate the KIC. The new scheme can overcome all of the above vulnerabilities, can resist the forged login attack and never revel the privacy of user even if the server is attacked.
引用
收藏
相关论文
共 50 条
  • [41] Improvement on a Smart Card Based Password Authentication Scheme
    He, Debiao
    Chen, Jianhua
    Hu, Jin
    JOURNAL OF INTERNET TECHNOLOGY, 2012, 13 (03): : 405 - 409
  • [42] One-time password password authentication scheme based on the negative database
    Zhao, Dongdong
    Luo, Wenjian
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2017, 62 : 396 - 404
  • [43] A PASSWORD AUTHENTICATION SCHEME BASED ON DISCRETE LOGARITHMS - COMMENT
    SUN, CH
    WANG, SD
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 1993, 49 (1-2) : 29 - 32
  • [44] Time-bounded based password authentication scheme
    Chang, CC
    Kuo, JY
    Lee, JS
    2005 INTERNATIONAL CONFERENCE ON CYBERWORLDS, PROCEEDINGS, 2005, : 117 - 122
  • [45] A Hybrid Password Authentication Scheme Based on Shape and Text
    Zheng, Ziran
    Liu, Xiyu
    Yin, Lizi
    Liu, Zhaocheng
    JOURNAL OF COMPUTERS, 2010, 5 (05) : 765 - 772
  • [46] Hash Chain based Strong Password Authentication Scheme
    Jan, Muhammad Shahzad
    Afzal, Mehreen
    2016 13TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2016, : 355 - 360
  • [47] A password based authentication scheme for wireless multimedia systems
    Nishant Doshi
    Saru Kumari
    Dheerendra Mishra
    Xiong Li
    Kim-Kwang Raymond Choo
    Arun Kumar Sangaiah
    Multimedia Tools and Applications, 2017, 76 : 25893 - 25918
  • [48] A Lightweight Timestamp-based MAC Detection Scheme for XOR Network Coding in Wireless Sensor Networks
    Zhai, Zhongyi
    Qian, Junyan
    Tao, Yuan
    Zhao, Lingzhong
    Cheng, Bo
    MOBICOM'18: PROCEEDINGS OF THE 24TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2018, : 735 - 737
  • [49] A Stroke-based Textual Password Authentication Scheme
    Zheng, Ziran
    Liu, Xiyu
    Yin, Lizi
    Liu, Zhaocheng
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL III, 2009, : 90 - +
  • [50] A Generalized Password Authentication Scheme based on Geometric Properties
    SuvadipHazra
    Om, Hari
    PROCEEDINGS OF THE 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL & ELECTRONICS, INFORMATION, COMMUNICATION & BIO INFORMATICS (IEEE AEEICB-2016), 2016, : 592 - 596