2003
DOI: 10.15388/informatica.2003.022
|View full text |Cite
|
Sign up to set email alerts
|

Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
17
0

Year Published

2006
2006
2019
2019

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 73 publications
(17 citation statements)
references
References 5 publications
0
17
0
Order By: Relevance
“…• Reducing computation cost: In the login and authentication phases, the proposed schemes need one modular exponential operation (similarly to the Wu-Chieu's scheme), while five operations are required in the scheme proposed by Hwang and Li. 16 The methods proposed by Chien, Jan, and Tseng, 17 Hwang, Lee, and Tang, 18 and Sun 19 do not require modular exponential operations other than one-way hash functions. The computation cost for a secure one-way hash function is not yet addressed clearly; however, it is widely believed that one-way functions exist 20 and its computation cost is lower than that of a modular exponential operation.…”
Section: Discussion and Security Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…• Reducing computation cost: In the login and authentication phases, the proposed schemes need one modular exponential operation (similarly to the Wu-Chieu's scheme), while five operations are required in the scheme proposed by Hwang and Li. 16 The methods proposed by Chien, Jan, and Tseng, 17 Hwang, Lee, and Tang, 18 and Sun 19 do not require modular exponential operations other than one-way hash functions. The computation cost for a secure one-way hash function is not yet addressed clearly; however, it is widely believed that one-way functions exist 20 and its computation cost is lower than that of a modular exponential operation.…”
Section: Discussion and Security Analysismentioning
confidence: 99%
“…Hwang and Li have proposed a remote user authentication scheme using smart cards. 5 The main advantage is that a password table is not required to verify a user's legitimacy. Unfortunately, several security flaws have been identified in their method.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2000, Hwang et al [5] proposed a remote user authentication scheme using smart cards based on ElGamal's public key cryptosystem [6]. But there exist some security flaws in Hwang et al's scheme [7][8][9]. Up to now, many remote user authentication schemes based on smart cards [10][11][12][13][14][15]32,33] were proposed to improve the security.…”
Section: Introductionmentioning
confidence: 99%
“…However, in such schemes, a verification table should be maintained on the remote server in order to validate the legitimacy of the requesting users; if intruders break into the server, they can modify the verification table. Therefore, many password authentication schemes [3][4][5][6][7] have recognized this problem, and different solutions have been proposed to avoid verification tables.…”
Section: Introductionmentioning
confidence: 99%