JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Symmetric Key-Based Remote User Authentication Scheme With Forward Secrecy
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Symmetric Key-Based Remote User Authentication Scheme With Forward Secrecy
Lee, SungYup; Park, KiSung; Park, YoHan; Park, YoungHo;
  PDF(new window)
 Abstract
Recently because of development of remote network technology, users are able to access the network freely without constraints of time and space. As users are getting more frequent to access the remote server in a computing environment, they are increasingly being exposed to various risk factors such as forward secrecy and server impersonation attack. Therefore, researches for remote user authentication scheme have been studying actively. This paper overcomes the weaknesses of many authentication schemes proposed recently. This paper suggests an improved authentication scheme that protects user`s anonymity with preserving variable more safe and also provides forward secrecy.
 Keywords
Remote User Authentication Scheme;Symmetric Key;Forward Secrecy;Smart Card;
 Language
Korean
 Cited by
 References
1.
G. Jaspher, W. Kathrine, E. Kirubakaran, and P. Prakash, "Smart Card Based Remote User Authentication Schemes: a Survey," Proceeding of International Conference on Modelling Optimization and Computing, pp. 1318-1326, 2012.

2.
R. Ramasamy and A.P. Muniyandi, “New Remote Mutual Authentication Scheme Using Smart Cards,” Transactions on Data Privacy, Vol. 2, No. 2, pp. 141-152, 2009.

3.
H.Y. Chien, J.K. Jan, and Y.M. Tseng, "An Efficient and Practical Solution to Remote Authentication: Smart Card," Journal of Computers & Security, Vol. 21, No. 4, pp. 372-375, 2002. crossref(new window)

4.
K.S. Park, S.Y. Lee, Y.H. Park, and Y.H. Park, "An ID-Based Remote User Authentication Scheme in IoT," Journal of Korea Multimedia Society, Vol. 18, No. 12, pp. 1483-1491, 2015. crossref(new window)

5.
M.K. Khan, S.K. Kim, and K. Alghathbar, "Cryptanalysis and Security Enhancement of a 'More Efficient & Secure Dynamic ID-based Remote User Authentication Scheme," Journal of Computer Communications, Vol. 34, No. 3, pp. 305-309, 2011. crossref(new window)

6.
Y.Y. Wang, J.Y. Kiu, F.X. Xiao, and J. Dan, "A More Efficient and Secure Dynamic IDBased Remote User Authentication Scheme," Journal of Computer Communications, Vol. 32, No. 4, pp. 583-585, 2009. crossref(new window)

7.
H.M. Chen, J.W. Lo, and C.K. Yeh, "An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems," Journal of Medical Systems, Vol. 36, No. 6, pp. 3907-3915, 2012. crossref(new window)

8.
Q. Jiang, J. Ma, Z. Ma, and G. Li, "A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems," Journal of Medical Systems, Vol. 37, No. 1, pp. 1-18, 2013. crossref(new window)

9.
S. Kumari, M.K. Khan, and R. Kumar, "Cryptanalysis and Improvement of 'A Privacy Enhanced Scheme for Telecare Medical Information System'," Journal of Medical Systems, Vol. 37, No. 4, pp. 1-11, 2013. crossref(new window)

10.
K.W. Kim and J.D. Lee, "On the Security of Two Remote User Authentication Schemes for Telecare Medical Information Systems," Journal of Medical Systems, Vol. 38, No. 5, pp. 1-11, 2014. crossref(new window)