Journal of shanghai Jiaotong University (Science) ›› 2014, Vol. 19 ›› Issue (4): 418-424.doi: 10.1007/s12204-014-1518-2
Previous Articles Next Articles
XIE Qi* (谢 琪), LIU Wen-hao (刘文浩), WANG Sheng-bao (王圣宝),HU Bin (胡 斌), DONG Na (董 娜), YU Xiu-yuan (于秀源)
Online:
2014-08-30
Published:
2014-10-13
Contact:
XIE Qi (谢 琪)
E-mail:qixie68@126.com
CLC Number:
XIE Qi* (谢 琪), LIU Wen-hao (刘文浩), WANG Sheng-bao (王圣宝),HU Bin (胡 斌), DONG Na (董 娜), YU Xiu-yuan (于秀源). Robust Password and Smart Card Based Authentication Scheme with Smart Card Revocation[J]. Journal of shanghai Jiaotong University (Science), 2014, 19(4): 418-424.
[1] Chen B L, Kuo W C, Wuu L C. A secure passwordbased remote user authentication scheme without smart cards [J]. Information Technology and Control,2012, 41(1): 53-59.[2] Chang C C, Hwang S J. Using smart cards to authenticate remote passwords [J]. Computers & Mathematics with Applications, 1993, 26(7): 19-27.[3] Li C T. Secure smart card based password authentication scheme with user anonymity [J]. Information Technology and Control, 2011, 40(2): 157-162.[4] Yoon E J, Ryu E K, Yoo K Y. Further improvement of an efficient password based remote user authentication scheme using smart cards [J]. IEEE Transactions on Consumer Electronics, 2004, 50(2): 612-614.[5] Kumar M. New remote user authentication scheme using smart cards [J]. IEEE Transactions on Consumer Electronics, 2004, 50 (2): 597-600.[6] Sun H M. An efficient remote user authentication scheme using smart cards [J]. IEEE Transactions on Consumer Electronics, 2000, 46(4): 958-961.[7] Xu J, Zhu W T, Feng D G. An Improved smart card based password authentication scheme with provable security [J]. Computer Standards & Interfaces, 2009,31(4): 723-728.[8] Xie Q. Improvement of a security enhanced one-time two-factor authentication and key agreement scheme[J]. Scientia Iranica, 2012, 19(6): 1856-1860.[9] Nose P. Security weaknesses of authenticated key agreement protocols [J]. Information Processing Letters,2011, 111(14): 687-696.[10] Kocher P, Jaffe J, Jun B. Differential power analysis [C]//Proceedings of Advances in Cryptology. Berlin:Springer, 1999: 388-397.[11] Messerges T S, Dabbish E A, Sloan R H. Examining smart-card security under the threat of power analysis attacks [J]. IEEE Transactions on Computers,2002, 51(5): 541-552.[12] Lee N Y, Chen J C. Improvement of one-time password authentication scheme using smart card [J].IEICE Transactiosn on Communications, 2005, E88-B(9): 3765-3769.[13] Wang X M, Zhang W F, Zhang J S, et al. Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards [J]. Computer Standards & Interfaces, 2007, 29(5): 507-512.[14] Chen T H, Hsiang H C, HihWK. Security enhancement on an improvement on two remote user authentication schemes using smart cards [J]. Future Generation Computer Systems, 2011, 27(4): 377-380.[15] H¨olbl M, Welzer T, Brumen B. Attacks and improvement of an efficient remote mutual authentication and key agreement scheme [J]. Cryptologia, 2009,34(1): 52-59.[16] Song R G. Advanced smart card based password authentication protocol [J]. Computer Standards & Interfaces,2010, 32(5-6): 321-325.[17] Li C T, Lee C C. A robust remote user authentication scheme using smart card [J]. Information Technology and Control, 2011, 40(3): 236-245.[18] Wang Y G. Password protected smart card and memory stick authentication against off-line dictionary attacks[C]//27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012. Boston: Springer,2012: 489-500.[19] Wang D, Ma C G, Wang P, et al. Robust smart card based password authentication scheme against smart card loss problem [EB/OL]. (2012-07-03) [2013-09-28].http://eprint.iacr.org/2012/439.[20] Hsiang H C, Shih W K. Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards [J]. Computer Communications,2009, 32(4): 649-652.[21] Chen T H, Huang J C. A novel user-participating authentication scheme [J]. The Journal of Systems and Software, 2010, 83(5): 861-867.[22] Abadi M, Blanchet B, Lundh H C. Models and proofs of protocol security: A progress report [J]. Computer Aided Verification, 2009, 5643: 35-49.[23] Abadi M, Fournet C.Mobile values, new names, and secure communication [C]//Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. New York: ACM, 2011: 104-115.[24] Blanchet B, Cheval V, Allamigeon X, et al.ProVerif: Cryptographic protocol verifier in the formal model [EB/OL]. (2012-07-03) [2013-09-28]. http://prosecco.gforge.inria.fr/personal/bblanche/proverif/.[25] Li C T, Hwang M S, Chu Y P. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks [J]. Computer Communication, 2008, 31(12):2803-2814. |
[1] | ZHANG Liang, QU Gang, LI Huixing, JIN Haochun. Research and Application of Key Technologies of Network Security Situation Awareness for Smart Grid Power Control Systems [J]. Journal of Shanghai Jiao Tong University, 2021, 55(S2): 103-109. |
[2] | ZHOU Yi, QIN Kangping, SUN Jinwen, FAN Dongqi, ZHENG Yiming. Real-Time Risk Evaluation Method of Power System Equipment and N-m Fault Contingency Plan Generation Under Typhoon Meteorological Environment [J]. Journal of Shanghai Jiao Tong University, 2021, 55(S2): 22-30. |
[3] | WU Nan, CHENG Zhetao, DU Liang, SHEN Yingping. Network Security Inference Method Based on Dempster-Shafer Theory [J]. Journal of Shanghai Jiao Tong University, 2021, 55(S2): 77-81. |
[4] | ZHANG Taolue∗ (张韬略), TU Huizhao (涂辉招), QIU Wei (邱 炜). Developing High-Precision Maps for Automated Driving in China: Legal Obstacles and the Way to Overcome Them [J]. J Shanghai Jiaotong Univ Sci, 2021, 26(5): 658-669. |
[5] | CHEN Ying, WEI Guoning, TANG Shengyong, KANG Zhiyu. Global Space Security Situation Analysis and Development Proposal [J]. Air & Space Defense, 2021, 4(3): 99-104. |
[6] | WANG Mingzheng, WANG Yijie, WANG Tianyu, HOU Linzao, LI Mian . New Approach for Information Security Evaluation and Management of IT Systems in Educational Institutions [J]. J Shanghai Jiaotong Univ Sci, 2020, 25(6): 689-699. |
[7] | YANG Guangyu, QIU Hongbing. Robust Optimization for Energy Efficiency for Secrecy MIMO SWIPT Systems [J]. Journal of Shanghai Jiao Tong University, 2020, 54(4): 369-375. |
[8] | SUN Zhuo,LIU Dong,XIAO Anhong,MING Pingzhou,GUO Wen,ZHOU Junyi,CHEN Junjie. Information Security Analysis of Digital Control System Based on Attack Tree Model [J]. Journal of Shanghai Jiaotong University, 2019, 53(Sup.1): 68-73. |
[9] | MIRZAEE Siavash, JIANG Letian *(蒋乐天). Fast Confidentiality-Preserving Authentication for Vehicular Ad Hoc Networks [J]. Journal of Shanghai Jiao Tong University (Science), 2019, 24(1): 31-40. |
[10] | HUA Cunqing. A Survey of Security Detection and Protection for Internet of Things [J]. Journal of Shanghai Jiaotong University, 2018, 52(10): 1307-1313. |
[11] | YI Ping,WANG Kedi,HUANG Cheng,GU Shuangchi,ZOU Futai,LI Jianhua. Adversarial Attacks in Artificial Intelligence: A Survey [J]. Journal of Shanghai Jiaotong University, 2018, 52(10): 1298-1306. |
[12] | XIA Yubin,CHEN Haibo,GUAN Haibing. Research on Computer System Isolation [J]. Journal of Shanghai Jiaotong University, 2018, 52(10): 1339-1347. |
[13] | LI Jianhua. A Survey of New E-Government and Its Security Technologies [J]. Journal of Shanghai Jiaotong University, 2018, 52(10): 1370-1381. |
[14] | Zhang Wei. Research on Key Technologies of Air Space [J]. Air & Space Defense, 2018, 1(1): 13-17. |
[15] | Xijiang CHEN, Guang ZHANG, Xianfeng CHEN, Hao WU. Diversified Safety Science and Engineering Innovation Experiment Platform [J]. Research and Exploration in Laboratory, 2017, 36(5): 260-263. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||