Browse > Article
http://dx.doi.org/10.9717/kmms.2016.19.3.585

Symmetric Key-Based Remote User Authentication Scheme With Forward Secrecy  

Lee, SungYup (School of Electronics Engineering, Graduate School, Kyungpook National University)
Park, KiSung (School of Electronics Engineering, Graduate School, Kyungpook National University)
Park, YoHan (School of Electronics Engineering, Kyungpook National University)
Park, YoungHo (School of Electronics Engineering, Kyungpook National University)
Publication Information
Abstract
Recently because of development of remote network technology, users are able to access the network freely without constraints of time and space. As users are getting more frequent to access the remote server in a computing environment, they are increasingly being exposed to various risk factors such as forward secrecy and server impersonation attack. Therefore, researches for remote user authentication scheme have been studying actively. This paper overcomes the weaknesses of many authentication schemes proposed recently. This paper suggests an improved authentication scheme that protects user's anonymity with preserving variable more safe and also provides forward secrecy.
Keywords
Remote User Authentication Scheme; Symmetric Key; Forward Secrecy; Smart Card;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 K.S. Park, S.Y. Lee, Y.H. Park, and Y.H. Park, "An ID-Based Remote User Authentication Scheme in IoT," Journal of Korea Multimedia Society, Vol. 18, No. 12, pp. 1483-1491, 2015.   DOI
2 G. Jaspher, W. Kathrine, E. Kirubakaran, and P. Prakash, "Smart Card Based Remote User Authentication Schemes: a Survey," Proceeding of International Conference on Modelling Optimization and Computing, pp. 1318-1326, 2012.
3 R. Ramasamy and A.P. Muniyandi, “New Remote Mutual Authentication Scheme Using Smart Cards,” Transactions on Data Privacy, Vol. 2, No. 2, pp. 141-152, 2009.
4 H.Y. Chien, J.K. Jan, and Y.M. Tseng, "An Efficient and Practical Solution to Remote Authentication: Smart Card," Journal of Computers & Security, Vol. 21, No. 4, pp. 372-375, 2002.   DOI
5 M.K. Khan, S.K. Kim, and K. Alghathbar, "Cryptanalysis and Security Enhancement of a 'More Efficient & Secure Dynamic ID-based Remote User Authentication Scheme," Journal of Computer Communications, Vol. 34, No. 3, pp. 305-309, 2011.   DOI
6 Y.Y. Wang, J.Y. Kiu, F.X. Xiao, and J. Dan, "A More Efficient and Secure Dynamic IDBased Remote User Authentication Scheme," Journal of Computer Communications, Vol. 32, No. 4, pp. 583-585, 2009.   DOI
7 H.M. Chen, J.W. Lo, and C.K. Yeh, "An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems," Journal of Medical Systems, Vol. 36, No. 6, pp. 3907-3915, 2012.   DOI
8 Q. Jiang, J. Ma, Z. Ma, and G. Li, "A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems," Journal of Medical Systems, Vol. 37, No. 1, pp. 1-18, 2013.   DOI
9 S. Kumari, M.K. Khan, and R. Kumar, "Cryptanalysis and Improvement of 'A Privacy Enhanced Scheme for Telecare Medical Information System'," Journal of Medical Systems, Vol. 37, No. 4, pp. 1-11, 2013.   DOI
10 K.W. Kim and J.D. Lee, "On the Security of Two Remote User Authentication Schemes for Telecare Medical Information Systems," Journal of Medical Systems, Vol. 38, No. 5, pp. 1-11, 2014.   DOI