𝔖 Bobbio Scriptorium
✦   LIBER   ✦

New dynamic ID authentication scheme using smart cards

✍ Scribed by Jia-Lun Tsai; Tzong-Chen Wu; Kuo-Yu Tsai


Publisher
John Wiley and Sons
Year
2010
Tongue
English
Weight
179 KB
Volume
23
Category
Article
ISSN
1074-5351

No coin nor oath required. For personal study only.

✦ Synopsis


Abstract

Recently, Yoon et al. and Wang et al. independently proposed a dynamic ID authentication scheme and claimed that their schemes can withstand the risk of ID‐theft, and several attacks. In this paper, we first demonstrate that both of the proposed schemes cannot achieve the security requirement for user anonymity and resist an impersonation attack yet. Then, we shall propose a new dynamic ID authentication scheme to overcome the above security weaknesses. We formally analyzed our proposed scheme with the BAN‐logic and shown that it can withstand the several possible attacks. Copyright Β© 2010 John Wiley & Sons, Ltd.


πŸ“œ SIMILAR VOLUMES


A user friendly remote authentication sc
✍ Shyi-Tsong Wu; Bin-Chang Chieu πŸ“‚ Article πŸ“… 2003 πŸ› Elsevier Science 🌐 English βš– 119 KB

Based on a one-way function, Sun [6] has proposed an efficient remote authentication scheme using smart cards. The scheme is very elaborate since no password table is required to keep as well as low communication and low computation costs. However, the password of a user has to be computed by the sy

Security enhancement for the timestamp-b
✍ Jau-Ji Shen; Chih-Wei Lin; Min-Shiang Hwang πŸ“‚ Article πŸ“… 2003 πŸ› Elsevier Science 🌐 English βš– 272 KB

In 1999, Yang and Shieh proposed a timestamp-based password authentication scheme with smart cards. However, Chan and Cheng showed that it was insecure because the scheme was vulnerable to the forged login attack. In this paper, we propose a modified Yang-Shieh scheme to enhance security. Our modifi

Multi application smart card schemes: Da
✍ Ewout Keuleers; Jean-Marc Dinant πŸ“‚ Article πŸ“… 2003 πŸ› Elsevier Science 🌐 English βš– 181 KB

This article, consisting of three parts, will comment on how the opportunities offered by multi-application smart card schemes can be reconciled with data protection requirements. In the first part, the focus will be on the regulatory framework of the smart card manufacturer and the legal requiremen