2011
DOI: 10.1016/j.comcom.2010.02.011
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
139
0
1

Year Published

2012
2012
2017
2017

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 214 publications
(140 citation statements)
references
References 24 publications
0
139
0
1
Order By: Relevance
“…Since Chang and Wu [9] developed the first smart-card-based password authentication scheme in 1991, there have been ample (in the hundreds) of this type of schemes proposed [15,20,23,26,28,31,48,53,57,58]. Unfortunately, as stated in [34,45], although there has been no lack of literature, it remains an immature area -all existing schemes are far from ideal and each has been shown to be either insecure or short of important features.…”
Section: Introductionmentioning
confidence: 97%
“…Since Chang and Wu [9] developed the first smart-card-based password authentication scheme in 1991, there have been ample (in the hundreds) of this type of schemes proposed [15,20,23,26,28,31,48,53,57,58]. Unfortunately, as stated in [34,45], although there has been no lack of literature, it remains an immature area -all existing schemes are far from ideal and each has been shown to be either insecure or short of important features.…”
Section: Introductionmentioning
confidence: 97%
“…In recent years, many dynamic identity-based remote login schemes [6,[16][17][18][19][20][21] have been proposed to provide mutual authentication between the user and the remote server. In any dynamic identity-based remote login scheme, users' anonymity [6,7,22] is an important security requirement.…”
Section: Users' Anonymity Problemmentioning
confidence: 99%
“…The ability to provide security guarantees is of paramount importance and several initiatives have been proposed to address this concern. Due to the low computation cost and portability of smartcard and easy memorization of user chosen password, two-factor smartcard authentication [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21] using password is commonly used in Internet-based applications such as remote user/server login, online banking, Pay-TV, electronic voting, secret online order placement.…”
Section: Introductionmentioning
confidence: 99%
“…As a good and new method to deal with ID theft, Das's scheme draws much attention. However, from then on, many authors raised concerns [19,20] about Das's scheme and devised a variety of improved schemes. In 2005, Chien and Chen [21] criticized Das's scheme of its incapability of preserving user anonymity and proposed an enhanced one.…”
Section: Introductionmentioning
confidence: 99%