Efficient Nonce-Based Authentication Scheme Using Token-Update

  • Wenbo Shi
  • Hyeong Seon Yoo
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3982)


In this paper an efficient token-update scheme based on nonce is proposed. This scheme provides an enhancement, resolving some problems with regard to Lee’s scheme, which cannot defend against and replay and impersonation attacks. Accordingly, an analysis and comparison with Lee’s and other schemes, demonstrate that the current paper avoids replay and impersonation attacks, providing mutual authentication, and also results in a lower computation cost than the original scheme.


Hash Function Smart Card Authentication Scheme Mutual Authentication Impersonation Attack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Haller, N.M.: The S/Key (TM) one-time password system. In: ISOC Symposium on Network and Distributed System Security, pp. 151–158 (1994)Google Scholar
  2. 2.
    Soh, B., Joy, A.: A Novel Web Security Evaluation Model for a One-Time- Password System. In: IEEE/WIC, pp. 413–416. IEEE Computer Society, WI (2003)Google Scholar
  3. 3.
    Juang, W.-S.: Efficient password authenticated key agreement using smart card. Computers & Security 23, 167–1738 (2004)CrossRefGoogle Scholar
  4. 4.
    Chen, T.H., Lee, W.B., Horng, G.: Secure SAS-like password authentication schemes. Computer Standards & Interfaces 27, 25–31 (2004)CrossRefGoogle Scholar
  5. 5.
    Lee, J., Jang, I., Yoo, H.S.: Modified token-update scheme for site authentication. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 111–116. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  6. 6.
    Chen, Y.-C., Yeh, L.-Y.: An efficient nonce-based authentication scheme with key agreement. Applied Mathematics and Computation 169, 982–994 (2005)zbMATHCrossRefMathSciNetGoogle Scholar
  7. 7.
    Chien, H.Y., Jan, J.K., Tseng, Y.M.: An efficient and practical solution to remote authentication with smart card. Computers & Security 21, 372–375 (2002)CrossRefGoogle Scholar
  8. 8.
    Fan, C.-I., Chan, Y.-C., Zhang, Z.-K.: Robust remote authentication scheme with smart cards. Computers & Security (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Wenbo Shi
    • 1
  • Hyeong Seon Yoo
    • 1
  1. 1.School of Computer Science and EngineeringInha UniversityIncheonKorea

Personalised recommendations