2005
DOI: 10.1016/j.csi.2004.02.002
|View full text |Cite
|
Sign up to set email alerts
|

Improvement of Chien et al.'s remote user authentication scheme using smart cards

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
40
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 89 publications
(40 citation statements)
references
References 6 publications
0
40
0
Order By: Relevance
“…Therefore, both the computation cost of the user and that of the service provider server are 5 T H + 4 T X and 6 T H + 3 T X respectively. The proposed protocol requires more computation than that of Kim and Chung's scheme but it is highly secure as compared to the related schemes (Chien et al, 2002;Lee et al, 2004aLee et al, , 2004bYoon and Yoo, 2005;Kim and Chung, 2009;Hsiang and Shih, 2009;Xu et al, 2009). The proposed protocol is free from masquerading user attack, masquerading server attack, offline dictionary attack and parallel session attack, while the latest scheme proposed by Kim and Chung (2009) suffers from these attacks.…”
Section: Cost and Functionality Analysismentioning
confidence: 91%
See 1 more Smart Citation
“…Therefore, both the computation cost of the user and that of the service provider server are 5 T H + 4 T X and 6 T H + 3 T X respectively. The proposed protocol requires more computation than that of Kim and Chung's scheme but it is highly secure as compared to the related schemes (Chien et al, 2002;Lee et al, 2004aLee et al, , 2004bYoon and Yoo, 2005;Kim and Chung, 2009;Hsiang and Shih, 2009;Xu et al, 2009). The proposed protocol is free from masquerading user attack, masquerading server attack, offline dictionary attack and parallel session attack, while the latest scheme proposed by Kim and Chung (2009) suffers from these attacks.…”
Section: Cost and Functionality Analysismentioning
confidence: 91%
“…Hsu (2004) demonstrated that Chien et al's scheme is susceptible to parallel session attack so that the intruder without knowing the user's password can masquerade as the legitimate user by creating a valid login message from the eavesdropped communication between the authentication server and the user. Lee et al (2004aLee et al ( , 2004b improved Chien et al's scheme by eliminating the parallel session attack. Yoon and Yoo (2005) found that Lee et al's schemes are susceptible to masquerading server attack and proposed an improvement on Lee et al's schemes.…”
Section: Introductionmentioning
confidence: 99%
“…In Chien et al's scheme, users are allowed to choose the password without registering with the server. In 2004, Lee et al [2] . gave a cryptanalysis to Chien C.-T. Li et al [6] .…”
Section: ⅰ Introductionmentioning
confidence: 99%
“…In the past couple of decades, there have been many researches [1][2][3][4][5][6][7][8][9][10][11][12] about remote user authentication over insecure network.…”
Section: ⅰ Introductionmentioning
confidence: 99%
“…For instance, there is no way to avoid an adversary from applying his impersonation attack to the victim user if both the user's password and smart card were lost/stolen. Therefore, several schemes [16][17][18][19] ensure the security of the system when either his password or his smart card is lost/stolen, but not both of them at the same time. On the opposite side, there is a sturdy secret key that combines smart cards and biometrics with passwords (called Multi-Factor Authentication (MFA)) that enjoy high entropy.…”
Section: Introductionmentioning
confidence: 99%