An improvement of the Yang-Shieh password authentication schemes

被引:22
|
作者
Yang, CC
Wang, RC
Chang, TY
机构
[1] Chaoyang Univ Technol, Dept Comp Sci & Informat & Commun Engn, Wufeng 413, Taichung County, Taiwan
[2] Chaoyang Univ Technol, Dept Informat Management, Wufeng 413, Taichung County, Taiwan
[3] Natl Chiao Tung Univ, Dept Comp & Informat Sci, Hsinchu 413, Taiwan
关键词
authentication; forgery attack; password; smart card;
D O I
10.1016/j.amc.2004.03.017
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Recently, Yang and Shieh proposed two password authentication schemes by employing smart cards. One is a timestamp-based password authentication scheme and the other is a nonce-based password authentication scheme. In 2002, Chan and Cheng pointed Out that Yang and Shieh's timestamp-based password authentication scheme was vulnerable to the forgery attack. However, in 2003, Sun and Yell pointed Out that Chan and Cheng's attack was unreasonable. At the same time, Sun and Yell pointed out that Yang and Shieh's password authentication schemes were still Vulnerable to the forgery attack. In this paper, we shall improve Yang and Shieh's schemes to resist Sun and Yell's attack. (C) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:1391 / 1396
页数:6
相关论文
共 50 条
  • [41] Security analysis and improvement of the efficient password-based authentication protocol
    Kwon, T
    Park, YH
    Lee, HJ
    IEEE COMMUNICATIONS LETTERS, 2005, 9 (01) : 93 - 95
  • [42] Improvement of robust smart-card-based password authentication scheme
    Jiang, Qi
    Ma, Jianfeng
    Li, Guangsong
    Li, Xinghua
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (02) : 383 - 393
  • [43] Improvement of Lamport's one-time password authentication scheme
    Tang, S.
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2001, 29 (08): : 70 - 72
  • [44] An Improvement Password-based Authentication Protocol Using Smart Card
    Hui, Liu
    SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, PTS 1-4, 2013, 303-306 : 2182 - 2185
  • [45] Weakness and simple improvement of a password authentication scheme based on geometric appraoch
    Ku, WC
    Chang, ST
    Chen, HH
    Tsaur, MJ
    LCN 2005: 30TH CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2005, : 472 - 473
  • [46] PASSWORD AUTHENTICATION WITHOUT USING A PASSWORD TABLE
    HORNG, GB
    INFORMATION PROCESSING LETTERS, 1995, 55 (05) : 247 - 250
  • [47] A password authentication scheme with secure password updating
    Lin, CL
    Hwang, T
    COMPUTERS & SECURITY, 2003, 22 (01) : 68 - 72
  • [48] Single password authentication
    Acar, Tolga
    Belenkiy, Mira
    Kupcu, Alptekin
    COMPUTER NETWORKS, 2013, 57 (13) : 2597 - 2614
  • [49] Password - a form of authentication
    Cisar, P.
    Cisar, S. Maravic
    2007 5TH INTERNATIONAL SYMPOSIUM ON INTELLIGENT SYSTEMS & INFORMATICS, 2007, : 23 - +
  • [50] Efficient password authentication schemes based on a geometric approach for a multi-server environment
    Horng-Twu LIAW
    Chih-Ta YEN
    Meng-Yu CHIU
    Li-Lin HSIAO
    Frontiers of Information Technology & Electronic Engineering, 2010, (12) : 989 - 997