Efficient Nonce-Based Authentication Scheme Using Token-Update

In this paper an efficient token-update scheme based on nonce is proposed. This scheme provides an enhancement, resolving some problems with regard to Lee’s scheme, which cannot defend against and replay and impersonation attacks. Accordingly, an analysis and comparison with Lee’s and other schemes,...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Shi, Wenbo, Yoo, Hyeong Seon
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 221
container_issue
container_start_page 213
container_title
container_volume
creator Shi, Wenbo
Yoo, Hyeong Seon
description In this paper an efficient token-update scheme based on nonce is proposed. This scheme provides an enhancement, resolving some problems with regard to Lee’s scheme, which cannot defend against and replay and impersonation attacks. Accordingly, an analysis and comparison with Lee’s and other schemes, demonstrate that the current paper avoids replay and impersonation attacks, providing mutual authentication, and also results in a lower computation cost than the original scheme.
doi_str_mv 10.1007/11751595_24
format Conference Proceeding
fullrecord <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_19968489</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>19968489</sourcerecordid><originalsourceid>FETCH-LOGICAL-p219t-d41ea7fccadbdd3b4fb5d7c47e0b5f9f5ed6b7311669e7dad029566211ec88423</originalsourceid><addsrcrecordid>eNpNkDtPwzAcxM1LopROfIEsDAwG_-NXvCCVqjykCgba2XL8aE1bJ4rDwLcnqCBxy0n3O91wCF0BuQVC5B2A5MAV1yU7QheUM0IZkUIdoxEIAEwpUydoomT1xzicohGhpMRKMnqOJjl_kEEUREWrEbqfhxBt9KkvXptkPX4w2bti-tlvhixa08cmFe924_e-WOWY1sWy2fqEV60zvb9EZ8Hssp_8-hitHufL2TNevD29zKYL3JageuwYeCODtcbVztGahZo7aZn0pOZBBe6dqCUFEEJ56YwjpeJClADeVhUr6RhdH3Zbk63Zhc4kG7Nuu7g33ZcGpUTFKjX0bg69PKC09p2um2abNRD9c6D-dyD9BuJpXQk</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Efficient Nonce-Based Authentication Scheme Using Token-Update</title><source>Springer Books</source><creator>Shi, Wenbo ; Yoo, Hyeong Seon</creator><contributor>Choo, Hyunseung ; Gervasi, Osvaldo ; Taniar, David ; Gavrilova, Marina ; Laganá, Antonio ; Kumar, Vipin ; Tan, C. J. Kenneth ; Mun, Youngsong</contributor><creatorcontrib>Shi, Wenbo ; Yoo, Hyeong Seon ; Choo, Hyunseung ; Gervasi, Osvaldo ; Taniar, David ; Gavrilova, Marina ; Laganá, Antonio ; Kumar, Vipin ; Tan, C. J. Kenneth ; Mun, Youngsong</creatorcontrib><description>In this paper an efficient token-update scheme based on nonce is proposed. This scheme provides an enhancement, resolving some problems with regard to Lee’s scheme, which cannot defend against and replay and impersonation attacks. Accordingly, an analysis and comparison with Lee’s and other schemes, demonstrate that the current paper avoids replay and impersonation attacks, providing mutual authentication, and also results in a lower computation cost than the original scheme.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540340751</identifier><identifier>ISBN: 3540340750</identifier><identifier>ISBN: 354034070X</identifier><identifier>ISBN: 9783540340706</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 3540340769</identifier><identifier>EISBN: 9783540340768</identifier><identifier>DOI: 10.1007/11751595_24</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Algorithmics. Computability. Computer arithmetics ; Applied sciences ; Authentication Scheme ; Computer science; control theory; systems ; Exact sciences and technology ; Hash Function ; Impersonation Attack ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Mutual Authentication ; Smart Card ; Software ; Theoretical computing</subject><ispartof>Computational Science and Its Applications - ICCSA 2006, 2006, p.213-221</ispartof><rights>Springer-Verlag Berlin Heidelberg 2006</rights><rights>2008 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11751595_24$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11751595_24$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,775,776,780,785,786,789,4036,4037,27902,38232,41418,42487</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=19968489$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Choo, Hyunseung</contributor><contributor>Gervasi, Osvaldo</contributor><contributor>Taniar, David</contributor><contributor>Gavrilova, Marina</contributor><contributor>Laganá, Antonio</contributor><contributor>Kumar, Vipin</contributor><contributor>Tan, C. J. Kenneth</contributor><contributor>Mun, Youngsong</contributor><creatorcontrib>Shi, Wenbo</creatorcontrib><creatorcontrib>Yoo, Hyeong Seon</creatorcontrib><title>Efficient Nonce-Based Authentication Scheme Using Token-Update</title><title>Computational Science and Its Applications - ICCSA 2006</title><description>In this paper an efficient token-update scheme based on nonce is proposed. This scheme provides an enhancement, resolving some problems with regard to Lee’s scheme, which cannot defend against and replay and impersonation attacks. Accordingly, an analysis and comparison with Lee’s and other schemes, demonstrate that the current paper avoids replay and impersonation attacks, providing mutual authentication, and also results in a lower computation cost than the original scheme.</description><subject>Algorithmics. Computability. Computer arithmetics</subject><subject>Applied sciences</subject><subject>Authentication Scheme</subject><subject>Computer science; control theory; systems</subject><subject>Exact sciences and technology</subject><subject>Hash Function</subject><subject>Impersonation Attack</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Mutual Authentication</subject><subject>Smart Card</subject><subject>Software</subject><subject>Theoretical computing</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540340751</isbn><isbn>3540340750</isbn><isbn>354034070X</isbn><isbn>9783540340706</isbn><isbn>3540340769</isbn><isbn>9783540340768</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpNkDtPwzAcxM1LopROfIEsDAwG_-NXvCCVqjykCgba2XL8aE1bJ4rDwLcnqCBxy0n3O91wCF0BuQVC5B2A5MAV1yU7QheUM0IZkUIdoxEIAEwpUydoomT1xzicohGhpMRKMnqOJjl_kEEUREWrEbqfhxBt9KkvXptkPX4w2bti-tlvhixa08cmFe924_e-WOWY1sWy2fqEV60zvb9EZ8Hssp_8-hitHufL2TNevD29zKYL3JageuwYeCODtcbVztGahZo7aZn0pOZBBe6dqCUFEEJ56YwjpeJClADeVhUr6RhdH3Zbk63Zhc4kG7Nuu7g33ZcGpUTFKjX0bg69PKC09p2um2abNRD9c6D-dyD9BuJpXQk</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>Shi, Wenbo</creator><creator>Yoo, Hyeong Seon</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2006</creationdate><title>Efficient Nonce-Based Authentication Scheme Using Token-Update</title><author>Shi, Wenbo ; Yoo, Hyeong Seon</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p219t-d41ea7fccadbdd3b4fb5d7c47e0b5f9f5ed6b7311669e7dad029566211ec88423</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Algorithmics. Computability. Computer arithmetics</topic><topic>Applied sciences</topic><topic>Authentication Scheme</topic><topic>Computer science; control theory; systems</topic><topic>Exact sciences and technology</topic><topic>Hash Function</topic><topic>Impersonation Attack</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Mutual Authentication</topic><topic>Smart Card</topic><topic>Software</topic><topic>Theoretical computing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Shi, Wenbo</creatorcontrib><creatorcontrib>Yoo, Hyeong Seon</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shi, Wenbo</au><au>Yoo, Hyeong Seon</au><au>Choo, Hyunseung</au><au>Gervasi, Osvaldo</au><au>Taniar, David</au><au>Gavrilova, Marina</au><au>Laganá, Antonio</au><au>Kumar, Vipin</au><au>Tan, C. J. Kenneth</au><au>Mun, Youngsong</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Efficient Nonce-Based Authentication Scheme Using Token-Update</atitle><btitle>Computational Science and Its Applications - ICCSA 2006</btitle><date>2006</date><risdate>2006</risdate><spage>213</spage><epage>221</epage><pages>213-221</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540340751</isbn><isbn>3540340750</isbn><isbn>354034070X</isbn><isbn>9783540340706</isbn><eisbn>3540340769</eisbn><eisbn>9783540340768</eisbn><abstract>In this paper an efficient token-update scheme based on nonce is proposed. This scheme provides an enhancement, resolving some problems with regard to Lee’s scheme, which cannot defend against and replay and impersonation attacks. Accordingly, an analysis and comparison with Lee’s and other schemes, demonstrate that the current paper avoids replay and impersonation attacks, providing mutual authentication, and also results in a lower computation cost than the original scheme.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11751595_24</doi><tpages>9</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Computational Science and Its Applications - ICCSA 2006, 2006, p.213-221
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_19968489
source Springer Books
subjects Algorithmics. Computability. Computer arithmetics
Applied sciences
Authentication Scheme
Computer science
control theory
systems
Exact sciences and technology
Hash Function
Impersonation Attack
Memory and file management (including protection and security)
Memory organisation. Data processing
Mutual Authentication
Smart Card
Software
Theoretical computing
title Efficient Nonce-Based Authentication Scheme Using Token-Update
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T03%3A28%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Efficient%20Nonce-Based%20Authentication%20Scheme%20Using%20Token-Update&rft.btitle=Computational%20Science%20and%20Its%20Applications%20-%20ICCSA%202006&rft.au=Shi,%20Wenbo&rft.date=2006&rft.spage=213&rft.epage=221&rft.pages=213-221&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540340751&rft.isbn_list=3540340750&rft.isbn_list=354034070X&rft.isbn_list=9783540340706&rft_id=info:doi/10.1007/11751595_24&rft_dat=%3Cpascalfrancis_sprin%3E19968489%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540340769&rft.eisbn_list=9783540340768&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true