Improvements on Hsiang and Shih's Remote User Authentication Scheme Using Smart Cards
We demonstrate how Hsiang and Shih's authentication scheme can be compromised and then propose an improved scheme based on the Rabin cryptosystem to overcome its weaknesses. Furthermore, we discuss the reason why we should use an asymmetric encryption algorithm to secure a password-based remote...
Gespeichert in:
Veröffentlicht in: | IEICE Transactions on Information and Systems 2012/10/01, Vol.E95.D(10), pp.2393-2400 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | We demonstrate how Hsiang and Shih's authentication scheme can be compromised and then propose an improved scheme based on the Rabin cryptosystem to overcome its weaknesses. Furthermore, we discuss the reason why we should use an asymmetric encryption algorithm to secure a password-based remote user authentication scheme using smart cards. We formally prove the security of our proposed scheme using the BAN logic. |
---|---|
ISSN: | 0916-8532 1745-1361 |
DOI: | 10.1587/transinf.E95.D.2393 |