Skip to main content

An Improved Lu-Cao’s Remote User Authentication Scheme Using Smart Card

  • Conference paper
Public Key Infrastructure (EuroPKI 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4043))

Included in the following conference series:

  • 547 Accesses

Abstract

In 2005, Lu-Cao proposed an improvement on Hwang-Li’s remote user authentication scheme using a smart card that could withstand an impersonation attack, but also it required fewer computational costs. However, the current paper demonstrates that Lu-Cao’s scheme has some drawbacks. We present an improved authentication scheme in order to isolate such problems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lamport, L.: Password Authentication with Insecure Communication. Communications of the ACM 24(11), 770–772 (1981)

    Article  MathSciNet  Google Scholar 

  2. Hwang, M.S., Li, L.H.: A New Remote User Authentication Scheme Using Smart Cards. IEEE Trans. On Consumer Electronics. 46(1), 28–30 (2000)

    Article  Google Scholar 

  3. Chan, C.K., Cheng, L.M.: Cryptanalysis of a Remote User Authentication Scheme Using Smart Cards. IEEE Trans. Consum. Electr. 46(4), 992–993 (2000)

    Article  Google Scholar 

  4. Chang, C.C., Hwang, K.F.: Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards. Informatics 14(3), 289–294 (2003)

    MATH  MathSciNet  Google Scholar 

  5. Shen, J.J., Lin, C.W., Hwang, M.S.: A Modified Remote User Authentication Scheme Using Smart Cards. IEEE Trans. Consum. Electr. 49(2), 414–416 (2003)

    Article  Google Scholar 

  6. Leung, K.C., Cheng, L.M., Fong, A.S., Chan, C.K.: Cryptanalysis of a Modified Remote User Authentication Scheme Using Smart Cards. IEEE Trans. Consum. Electr. 49(4), 1243–1245 (2003)

    Article  Google Scholar 

  7. Lu, R., Cao, Z.: Efficient Remote User Authentication Scheme Using Smart Card. Computer Networks 49, 535–540 (2005)

    Article  MATH  Google Scholar 

  8. Ding, Y., Horster, P.: Undetectable Online Password Guessing Attacks. ACM Operating Systems Review 29(4), 77–86 (1995)

    Article  Google Scholar 

  9. Cao, Z.F.: A Threshold Key Escrow Scheme based on Public Key Cryptosystem. Sci. China. 44(4), 441–448 (2001)

    Google Scholar 

  10. Rabin, M.O.: Digitalized Signature and Public Key Functions as Intractable as Factorization. Technical Report 212. MIT Laboratory for Computer Science (January 1979)

    Google Scholar 

  11. Needham, R.M., Schroeder, M.D.: Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM 21(12), 993–999 (1978)

    Article  MATH  Google Scholar 

  12. Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptograph. CRC Press, New York (1997)

    Google Scholar 

  13. Aoskan, N., Debar, H., Steiner, M., Waidner, M.: Authentication Public Terminals. Computers Networks 31, 861–970 (1999)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yoon, EJ., Yoo, KY. (2006). An Improved Lu-Cao’s Remote User Authentication Scheme Using Smart Card. In: Atzeni, A.S., Lioy, A. (eds) Public Key Infrastructure. EuroPKI 2006. Lecture Notes in Computer Science, vol 4043. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11774716_4

Download citation

  • DOI: https://doi.org/10.1007/11774716_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-35151-1

  • Online ISBN: 978-3-540-35152-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics