Efficient Nonce-Based Authentication Scheme Using Token-Update
In this paper an efficient token-update scheme based on nonce is proposed. This scheme provides an enhancement, resolving some problems with regard to Lee’s scheme, which cannot defend against and replay and impersonation attacks. Accordingly, an analysis and comparison with Lee’s and other schemes,...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 221 |
---|---|
container_issue | |
container_start_page | 213 |
container_title | |
container_volume | |
creator | Shi, Wenbo Yoo, Hyeong Seon |
description | In this paper an efficient token-update scheme based on nonce is proposed. This scheme provides an enhancement, resolving some problems with regard to Lee’s scheme, which cannot defend against and replay and impersonation attacks. Accordingly, an analysis and comparison with Lee’s and other schemes, demonstrate that the current paper avoids replay and impersonation attacks, providing mutual authentication, and also results in a lower computation cost than the original scheme. |
doi_str_mv | 10.1007/11751595_24 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_19968489</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>19968489</sourcerecordid><originalsourceid>FETCH-LOGICAL-p219t-d41ea7fccadbdd3b4fb5d7c47e0b5f9f5ed6b7311669e7dad029566211ec88423</originalsourceid><addsrcrecordid>eNpNkDtPwzAcxM1LopROfIEsDAwG_-NXvCCVqjykCgba2XL8aE1bJ4rDwLcnqCBxy0n3O91wCF0BuQVC5B2A5MAV1yU7QheUM0IZkUIdoxEIAEwpUydoomT1xzicohGhpMRKMnqOJjl_kEEUREWrEbqfhxBt9KkvXptkPX4w2bti-tlvhixa08cmFe924_e-WOWY1sWy2fqEV60zvb9EZ8Hssp_8-hitHufL2TNevD29zKYL3JageuwYeCODtcbVztGahZo7aZn0pOZBBe6dqCUFEEJ56YwjpeJClADeVhUr6RhdH3Zbk63Zhc4kG7Nuu7g33ZcGpUTFKjX0bg69PKC09p2um2abNRD9c6D-dyD9BuJpXQk</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Efficient Nonce-Based Authentication Scheme Using Token-Update</title><source>Springer Books</source><creator>Shi, Wenbo ; Yoo, Hyeong Seon</creator><contributor>Choo, Hyunseung ; Gervasi, Osvaldo ; Taniar, David ; Gavrilova, Marina ; Laganá, Antonio ; Kumar, Vipin ; Tan, C. J. Kenneth ; Mun, Youngsong</contributor><creatorcontrib>Shi, Wenbo ; Yoo, Hyeong Seon ; Choo, Hyunseung ; Gervasi, Osvaldo ; Taniar, David ; Gavrilova, Marina ; Laganá, Antonio ; Kumar, Vipin ; Tan, C. J. Kenneth ; Mun, Youngsong</creatorcontrib><description>In this paper an efficient token-update scheme based on nonce is proposed. This scheme provides an enhancement, resolving some problems with regard to Lee’s scheme, which cannot defend against and replay and impersonation attacks. Accordingly, an analysis and comparison with Lee’s and other schemes, demonstrate that the current paper avoids replay and impersonation attacks, providing mutual authentication, and also results in a lower computation cost than the original scheme.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540340751</identifier><identifier>ISBN: 3540340750</identifier><identifier>ISBN: 354034070X</identifier><identifier>ISBN: 9783540340706</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 3540340769</identifier><identifier>EISBN: 9783540340768</identifier><identifier>DOI: 10.1007/11751595_24</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Algorithmics. Computability. Computer arithmetics ; Applied sciences ; Authentication Scheme ; Computer science; control theory; systems ; Exact sciences and technology ; Hash Function ; Impersonation Attack ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Mutual Authentication ; Smart Card ; Software ; Theoretical computing</subject><ispartof>Computational Science and Its Applications - ICCSA 2006, 2006, p.213-221</ispartof><rights>Springer-Verlag Berlin Heidelberg 2006</rights><rights>2008 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11751595_24$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11751595_24$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,775,776,780,785,786,789,4036,4037,27902,38232,41418,42487</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=19968489$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Choo, Hyunseung</contributor><contributor>Gervasi, Osvaldo</contributor><contributor>Taniar, David</contributor><contributor>Gavrilova, Marina</contributor><contributor>Laganá, Antonio</contributor><contributor>Kumar, Vipin</contributor><contributor>Tan, C. J. Kenneth</contributor><contributor>Mun, Youngsong</contributor><creatorcontrib>Shi, Wenbo</creatorcontrib><creatorcontrib>Yoo, Hyeong Seon</creatorcontrib><title>Efficient Nonce-Based Authentication Scheme Using Token-Update</title><title>Computational Science and Its Applications - ICCSA 2006</title><description>In this paper an efficient token-update scheme based on nonce is proposed. This scheme provides an enhancement, resolving some problems with regard to Lee’s scheme, which cannot defend against and replay and impersonation attacks. Accordingly, an analysis and comparison with Lee’s and other schemes, demonstrate that the current paper avoids replay and impersonation attacks, providing mutual authentication, and also results in a lower computation cost than the original scheme.</description><subject>Algorithmics. Computability. Computer arithmetics</subject><subject>Applied sciences</subject><subject>Authentication Scheme</subject><subject>Computer science; control theory; systems</subject><subject>Exact sciences and technology</subject><subject>Hash Function</subject><subject>Impersonation Attack</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Mutual Authentication</subject><subject>Smart Card</subject><subject>Software</subject><subject>Theoretical computing</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540340751</isbn><isbn>3540340750</isbn><isbn>354034070X</isbn><isbn>9783540340706</isbn><isbn>3540340769</isbn><isbn>9783540340768</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpNkDtPwzAcxM1LopROfIEsDAwG_-NXvCCVqjykCgba2XL8aE1bJ4rDwLcnqCBxy0n3O91wCF0BuQVC5B2A5MAV1yU7QheUM0IZkUIdoxEIAEwpUydoomT1xzicohGhpMRKMnqOJjl_kEEUREWrEbqfhxBt9KkvXptkPX4w2bti-tlvhixa08cmFe924_e-WOWY1sWy2fqEV60zvb9EZ8Hssp_8-hitHufL2TNevD29zKYL3JageuwYeCODtcbVztGahZo7aZn0pOZBBe6dqCUFEEJ56YwjpeJClADeVhUr6RhdH3Zbk63Zhc4kG7Nuu7g33ZcGpUTFKjX0bg69PKC09p2um2abNRD9c6D-dyD9BuJpXQk</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>Shi, Wenbo</creator><creator>Yoo, Hyeong Seon</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2006</creationdate><title>Efficient Nonce-Based Authentication Scheme Using Token-Update</title><author>Shi, Wenbo ; Yoo, Hyeong Seon</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p219t-d41ea7fccadbdd3b4fb5d7c47e0b5f9f5ed6b7311669e7dad029566211ec88423</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Algorithmics. Computability. Computer arithmetics</topic><topic>Applied sciences</topic><topic>Authentication Scheme</topic><topic>Computer science; control theory; systems</topic><topic>Exact sciences and technology</topic><topic>Hash Function</topic><topic>Impersonation Attack</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Mutual Authentication</topic><topic>Smart Card</topic><topic>Software</topic><topic>Theoretical computing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Shi, Wenbo</creatorcontrib><creatorcontrib>Yoo, Hyeong Seon</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shi, Wenbo</au><au>Yoo, Hyeong Seon</au><au>Choo, Hyunseung</au><au>Gervasi, Osvaldo</au><au>Taniar, David</au><au>Gavrilova, Marina</au><au>Laganá, Antonio</au><au>Kumar, Vipin</au><au>Tan, C. J. Kenneth</au><au>Mun, Youngsong</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Efficient Nonce-Based Authentication Scheme Using Token-Update</atitle><btitle>Computational Science and Its Applications - ICCSA 2006</btitle><date>2006</date><risdate>2006</risdate><spage>213</spage><epage>221</epage><pages>213-221</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540340751</isbn><isbn>3540340750</isbn><isbn>354034070X</isbn><isbn>9783540340706</isbn><eisbn>3540340769</eisbn><eisbn>9783540340768</eisbn><abstract>In this paper an efficient token-update scheme based on nonce is proposed. This scheme provides an enhancement, resolving some problems with regard to Lee’s scheme, which cannot defend against and replay and impersonation attacks. Accordingly, an analysis and comparison with Lee’s and other schemes, demonstrate that the current paper avoids replay and impersonation attacks, providing mutual authentication, and also results in a lower computation cost than the original scheme.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11751595_24</doi><tpages>9</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Computational Science and Its Applications - ICCSA 2006, 2006, p.213-221 |
issn | 0302-9743 1611-3349 |
language | eng |
recordid | cdi_pascalfrancis_primary_19968489 |
source | Springer Books |
subjects | Algorithmics. Computability. Computer arithmetics Applied sciences Authentication Scheme Computer science control theory systems Exact sciences and technology Hash Function Impersonation Attack Memory and file management (including protection and security) Memory organisation. Data processing Mutual Authentication Smart Card Software Theoretical computing |
title | Efficient Nonce-Based Authentication Scheme Using Token-Update |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T03%3A28%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Efficient%20Nonce-Based%20Authentication%20Scheme%20Using%20Token-Update&rft.btitle=Computational%20Science%20and%20Its%20Applications%20-%20ICCSA%202006&rft.au=Shi,%20Wenbo&rft.date=2006&rft.spage=213&rft.epage=221&rft.pages=213-221&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540340751&rft.isbn_list=3540340750&rft.isbn_list=354034070X&rft.isbn_list=9783540340706&rft_id=info:doi/10.1007/11751595_24&rft_dat=%3Cpascalfrancis_sprin%3E19968489%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540340769&rft.eisbn_list=9783540340768&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |