2004
DOI: 10.1109/tce.2004.1309428
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of security enhancement for the timestamp-based password authentication scheme using smart cards

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2006
2006
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…In Lamport's scheme, password table was used to verify the legitimacy of users, but if this password table is compromised, stolen, or modified by an adversary, then the system could be partially or completely compromised [6], [7]. Some more recent smart card based password authentication schemes have been proposed in [8], [9]and many of the schemes have been broken as shown by [10], [11], [7]. Shoup-Rubin [12] proposed extension of Bellare-Rogaway model [13]which is based on three party key distribution protocol and smartcard is used to store the long term secret keys.…”
Section: Cloud Securitymentioning
confidence: 99%
“…In Lamport's scheme, password table was used to verify the legitimacy of users, but if this password table is compromised, stolen, or modified by an adversary, then the system could be partially or completely compromised [6], [7]. Some more recent smart card based password authentication schemes have been proposed in [8], [9]and many of the schemes have been broken as shown by [10], [11], [7]. Shoup-Rubin [12] proposed extension of Bellare-Rogaway model [13]which is based on three party key distribution protocol and smartcard is used to store the long term secret keys.…”
Section: Cloud Securitymentioning
confidence: 99%
“…In Lamport's scheme, password table was used to verify the legitimacy of users, but if this password table is compromised, stolen, or modified by an unauthorized party, then the system could be partially or completely compromised [2], [3]. Some more recent smart card based password authentication schemes have been proposed in [4], [5] and many of the schemes have been broken as shown by [6], [7], [3]. Shoup-Rubin [8] proposed extension of Bellare-Rogaway model [9]which is based on three party key distribution protocol and smartcard is used to store the long term secret keys.…”
Section: Cloud Securitymentioning
confidence: 99%