Skip to main content

One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity

  • Conference paper
Computational Science and Its Applications - ICCSA 2006 (ICCSA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3984))

Included in the following conference series:

Abstract

In 2005, Lee and Chen proposed an improved one-time password authentication scheme that can prevent a stolen verifier attack and that is as efficient as the scheme of Yeh-Shen-Hwang. The current paper, however, demonstrates that Lee-Chen’s scheme is still vulnerable to Denial-of-Service attacks and a simple solution is presented in order to isolate such a problem. Furthermore, we propose an efficiently optimized one-time password authentication scheme that can provide user anonymity. In addition the computational costs are lower than those of Lee-Chen’s scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mitchell, C.J., Chen, L.: Comments on the S/KEY User Authentication Scheme. ACM Operating Systems Review 30(4), 12–16 (1996)

    Article  Google Scholar 

  2. Haller, N.M.: The S/KEY One-time Password System. RFC 1760 (Febrauary 1995)

    Google Scholar 

  3. Haller, N.M.: A One-time Password System. RFC 1938 (May 1996)

    Google Scholar 

  4. Yeh, T.C., Shen, H.Y., Hwang, J.J.: A Secure One-time Password Authentication Scheme Using Smart Cards. IEICE Trans. Commun. E85-B(11), 2515–2518 (2002)

    Google Scholar 

  5. Tsuji, T., Shimizu, A.: Cryptanalysis on One-time Password Authentication Schemes Using Counter Value. IEICE Trans. Commun. E87-B(6), 2756–2759 (2004)

    Google Scholar 

  6. Ku, W.C., Tsai, H.C., Tsaur, M.J.: Stolen-verifier Attack on An Efficient Smartcard-based One-time Password Authentication Scheme. IEICE Trans. Commun. E87-B(8), 2374–2376 (2004)

    Google Scholar 

  7. Lee, N.Y., Chen, J.C.: Improvement of One-time Password Authentication Scheme Using Smart Cards. IEICE Trans. Commun. E88-B(9), 3765–3767 (2005)

    Google Scholar 

  8. Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptograph. CRC Press, New York (1997)

    Google Scholar 

  9. Lin, C.L., Hwang, T.: A Password Authentication Scheme with Secure Password Updating. Computers & Security 22(1), 68–72 (2003)

    Article  Google Scholar 

  10. Yoon, E.-J., Kim, W.-H., Yoo, K.-Y.: Robust and simple authentication protocol for secure communication on the web. In: Lowe, D.G., Gaedke, M. (eds.) ICWE 2005. LNCS, vol. 3579, pp. 352–362. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  11. Ku, W.C., Chen, S.M.: Weaknesses and Improvements of an Efficient Password based Remote User Authentication Scheme Using Smart Cards. IEEE Trans. on Consumer Electronics 50(1), 204–207 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yoon, EJ., Yoo, KY. (2006). One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3984. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751649_33

Download citation

  • DOI: https://doi.org/10.1007/11751649_33

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34079-9

  • Online ISBN: 978-3-540-34080-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics