We demonstrate how Hsiang and Shih's authentication scheme can be compromised and then propose an improved scheme based on the Rabin cryptosystem to overcome its weaknesses. Furthermore, we discuss the reason why we should use an asymmetric encryption algorithm to secure a password-based remote user authentication scheme using smart cards. We formally prove the security of our proposed scheme using the BAN logic.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Jung-Yoon KIM, Hyoung-Kee CHOI, "Improvements on Hsiang and Shih's Remote User Authentication Scheme Using Smart Cards" in IEICE TRANSACTIONS on Information,
vol. E95-D, no. 10, pp. 2393-2400, October 2012, doi: 10.1587/transinf.E95.D.2393.
Abstract: We demonstrate how Hsiang and Shih's authentication scheme can be compromised and then propose an improved scheme based on the Rabin cryptosystem to overcome its weaknesses. Furthermore, we discuss the reason why we should use an asymmetric encryption algorithm to secure a password-based remote user authentication scheme using smart cards. We formally prove the security of our proposed scheme using the BAN logic.
URL: https://globals.ieice.org/en_transactions/information/10.1587/transinf.E95.D.2393/_p
Copy
@ARTICLE{e95-d_10_2393,
author={Jung-Yoon KIM, Hyoung-Kee CHOI, },
journal={IEICE TRANSACTIONS on Information},
title={Improvements on Hsiang and Shih's Remote User Authentication Scheme Using Smart Cards},
year={2012},
volume={E95-D},
number={10},
pages={2393-2400},
abstract={We demonstrate how Hsiang and Shih's authentication scheme can be compromised and then propose an improved scheme based on the Rabin cryptosystem to overcome its weaknesses. Furthermore, we discuss the reason why we should use an asymmetric encryption algorithm to secure a password-based remote user authentication scheme using smart cards. We formally prove the security of our proposed scheme using the BAN logic.},
keywords={},
doi={10.1587/transinf.E95.D.2393},
ISSN={1745-1361},
month={October},}
Copy
TY - JOUR
TI - Improvements on Hsiang and Shih's Remote User Authentication Scheme Using Smart Cards
T2 - IEICE TRANSACTIONS on Information
SP - 2393
EP - 2400
AU - Jung-Yoon KIM
AU - Hyoung-Kee CHOI
PY - 2012
DO - 10.1587/transinf.E95.D.2393
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E95-D
IS - 10
JA - IEICE TRANSACTIONS on Information
Y1 - October 2012
AB - We demonstrate how Hsiang and Shih's authentication scheme can be compromised and then propose an improved scheme based on the Rabin cryptosystem to overcome its weaknesses. Furthermore, we discuss the reason why we should use an asymmetric encryption algorithm to secure a password-based remote user authentication scheme using smart cards. We formally prove the security of our proposed scheme using the BAN logic.
ER -