Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Efficient Nonce-Based Authentication Scheme Using Token-Update

  • Conference paper
Computational Science and Its Applications - ICCSA 2006 (ICCSA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3982))

Included in the following conference series:

  • 1447 Accesses

Abstract

In this paper an efficient token-update scheme based on nonce is proposed. This scheme provides an enhancement, resolving some problems with regard to Lee’s scheme, which cannot defend against and replay and impersonation attacks. Accordingly, an analysis and comparison with Lee’s and other schemes, demonstrate that the current paper avoids replay and impersonation attacks, providing mutual authentication, and also results in a lower computation cost than the original scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Haller, N.M.: The S/Key (TM) one-time password system. In: ISOC Symposium on Network and Distributed System Security, pp. 151–158 (1994)

    Google Scholar 

  2. Soh, B., Joy, A.: A Novel Web Security Evaluation Model for a One-Time- Password System. In: IEEE/WIC, pp. 413–416. IEEE Computer Society, WI (2003)

    Google Scholar 

  3. Juang, W.-S.: Efficient password authenticated key agreement using smart card. Computers & Security 23, 167–1738 (2004)

    Article  Google Scholar 

  4. Chen, T.H., Lee, W.B., Horng, G.: Secure SAS-like password authentication schemes. Computer Standards & Interfaces 27, 25–31 (2004)

    Article  Google Scholar 

  5. Lee, J., Jang, I., Yoo, H.S.: Modified token-update scheme for site authentication. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 111–116. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  6. Chen, Y.-C., Yeh, L.-Y.: An efficient nonce-based authentication scheme with key agreement. Applied Mathematics and Computation 169, 982–994 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  7. Chien, H.Y., Jan, J.K., Tseng, Y.M.: An efficient and practical solution to remote authentication with smart card. Computers & Security 21, 372–375 (2002)

    Article  Google Scholar 

  8. Fan, C.-I., Chan, Y.-C., Zhang, Z.-K.: Robust remote authentication scheme with smart cards. Computers & Security (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shi, W., Yoo, H.S. (2006). Efficient Nonce-Based Authentication Scheme Using Token-Update. In: Gavrilova, M., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3982. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751595_24

Download citation

  • DOI: https://doi.org/10.1007/11751595_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34075-1

  • Online ISBN: 978-3-540-34076-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics