Abstract
The smart card based remote user authentication and key agreement protocol is a very practical solution to create a secure distributed computer environment. In this paper, we propose a smart card based secret-key exponential key agreement protocol called SEKA, which provides mutual authentication and key agreement over an insecure channel between user and server. The computational complexity that the client must perform is just one exponentiation and two hash functions during the runtime of the protocol.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Lamport, L.: Password Authentication with Insecure Communication. Communications of the ACM 24(11), 770–772 (1981)
Chang, C.C., Wu, T.C.: Remote Password Authentication with Smart Cards. IEE Proceedings-E 138(3), 165–168 (1991)
Chang, C., Hwang, S.: Using Smart Cards to Authenticate Remote Passwords. Comput. Math. Appl. 26(7), 19–27 (1993)
Wang, S., Chang, T.: Smart Card based Secure Password Authentication Scheme. Computers & Security 15(3), 231–237 (1996)
Wu, T.C., Sung, H.S.: Authentication Passwords over an Insecure Channel. Computer & Security 15(5), 431–439 (1996)
Yang, W.H., Shieh, S.P.: Password Authentication Schemes with Smart Card. Computer & Security 18(8), 727–733 (1999)
Hwang, M.S., Li, L.H.: A New Remote User Authentication Scheme Using Smart Cards. IEEE Trans. On Consumer Electronics 46(1), 28–30 (2000)
Sun, H.M.: An Efficient Remote User Authentication Scheme Using Smart Cards. IEEE Trans. on Consumer Electronics 46(4), 958–961 (2000)
Chien, H.Y., Jan, J.K., Tseng, Y.M.: An Efficient and Practical Solution to Remote Authentication: Smart Card. Computers & Security 21(4), 372–375 (2002)
Fan, L., Li, J.H., Zhu, H.W.: An Enhancement of Timestamp-based Password Authentication Scheme. Computers & Security 21(7), 665–667 (2002)
Wu, S.T., Chieu, B.C.: A User Friendly Remote Authentication Scheme with Smart Cards. Computers & Security 22(6), 547–550 (2003)
Shen, J.J., Lin, C.W., Hwang, M.S.: Security Enhancement for the Timestampbased Password Authentication Scheme Using Smart Cards. Computers & Security 22(7), 591–595 (2003)
Chen, K.F.: Attacks on the (Enhanced) Yang-Shieh Authentication. Computers & Security 22(8), 725–727 (2003)
Wu, S.T., Chieu, B.C.: A User Friendly Remote Authentication Scheme with Smart Cards. Computers & Security 22(6), 547–550 (2003)
Yoon, E.J., Ryu, E.K., Yoo, K.Y.: Security of Shen et al. ’s Timestamp-based Password Authentication Scheme. In: Laganà, A., Gavrilova, M., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3046, pp. 665–671. Springer, Heidelberg (2004)
Yoon, E.J., Ryu, E.K., Yoo, K.Y.: Robust Remote User Authentication Scheme. In: Kahng, H.-K., Goto, S. (eds.) ICOIN 2004. LNCS, vol. 3090, pp. 935–942. Springer, Heidelberg (2004)
Juang, W.S.: Efficient Password Authenticated Key Agreement Using Smart Cards. Computers & Security 23(2), 167–173 (2004)
Jablon, D.: Strong Password-only Authenticated Key Exchange. ACM Computer Communications Review 26(5), 5–26 (1996)
Bellovin, S., Merritt, M.: Encrypted Key Exchange: Password-based Protocols Secure Against Dictionary Attacks. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 72–84 (1992)
Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Trans Inf Theory IT-22(6), 644–654 (1976)
Rivest, R.: The MD5 Message-digest Algorithm. RFC 1321. Internet Activities Board. Internet Privacy Task Force (1992)
NIST FIPS PUB 180.: Secure Hash Standard. National Institute of Standards and Technology. U.S. Department of Commerce. DRAFT (1993)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yoon, EJ., Yoo, KY. (2007). A Secret-Key Exponential Key Agreement Protocol with Smart Cards. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds) Autonomic and Trusted Computing. ATC 2007. Lecture Notes in Computer Science, vol 4610. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73547-2_44
Download citation
DOI: https://doi.org/10.1007/978-3-540-73547-2_44
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73546-5
Online ISBN: 978-3-540-73547-2
eBook Packages: Computer ScienceComputer Science (R0)