Publications-Periodical Articles

Article View/Open

Publication Export

Google ScholarTM

NCCU Library

Citation Infomation

Related Publications in TAIR

題名 Cryptanalysis and improvement of an efficient password authentication scheme based on smart card
作者 Tso, Ray-Lin
左瑞麟
Wu, M.-E.
Lin, Yi Shiuan
貢獻者 資科系
關鍵詞 Access control; Chaotic systems; Hash functions; Smart cards; Transportation; Anonymity; Chaotic map; Mutual authentication protocols; One way hash functions; Password authentication; Remote servers; Secret information; User authentication; Authentication
日期 2015-01
上傳時間 11-Jun-2015 13:36:47 (UTC+8)
摘要 User authentication is an important technology to guarantee that only the legal users can access resources from the remote server. In 2013, based on chaotic maps, Guo and Chang proposed an efficient mutual authentication protocol with user anonymity for the smart card. Unfortunately, this study will demonstrate their scheme could not achieve the user anonymity property, and do not allow changing password freely for the user. Then, we proposed a new method to remedy the weaknesses. The proposed method is secure even if the secret information stored in the smart card is compromised. Only one-way hash function and simple polynomial computations are involved in our protocol. It is more suitable for practice implementation.
關聯 Journal of Computers (Taiwan), 25(4), 35-43
資料類型 article
dc.contributor 資科系-
dc.creator (作者) Tso, Ray-Lin-
dc.creator (作者) 左瑞麟zh_TW
dc.creator (作者) Wu, M.-E.en_US
dc.creator (作者) Lin, Yi Shiuanen_US
dc.date (日期) 2015-01-
dc.date.accessioned 11-Jun-2015 13:36:47 (UTC+8)-
dc.date.available 11-Jun-2015 13:36:47 (UTC+8)-
dc.date.issued (上傳時間) 11-Jun-2015 13:36:47 (UTC+8)-
dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/75681-
dc.description.abstract (摘要) User authentication is an important technology to guarantee that only the legal users can access resources from the remote server. In 2013, based on chaotic maps, Guo and Chang proposed an efficient mutual authentication protocol with user anonymity for the smart card. Unfortunately, this study will demonstrate their scheme could not achieve the user anonymity property, and do not allow changing password freely for the user. Then, we proposed a new method to remedy the weaknesses. The proposed method is secure even if the secret information stored in the smart card is compromised. Only one-way hash function and simple polynomial computations are involved in our protocol. It is more suitable for practice implementation.-
dc.format.extent 308981 bytes-
dc.format.mimetype application/pdf-
dc.relation (關聯) Journal of Computers (Taiwan), 25(4), 35-43-
dc.subject (關鍵詞) Access control; Chaotic systems; Hash functions; Smart cards; Transportation; Anonymity; Chaotic map; Mutual authentication protocols; One way hash functions; Password authentication; Remote servers; Secret information; User authentication; Authentication-
dc.title (題名) Cryptanalysis and improvement of an efficient password authentication scheme based on smart card-
dc.type (資料類型) articleen