Browse > Article
http://dx.doi.org/10.7472/jksii.2013.14.4.43

A Verifier-free Scheme for User Authentication and Access Control Using Smart Cards: Improvement of Chen-Yeh's Method  

Kim, Yong (Department of Library and Information Science, Chonbuk National University)
Chung, Min Gyo (Department of Computer Science, Seoul Women's University)
Publication Information
Journal of Internet Computing and Services / v.14, no.4, 2013 , pp. 43-51 More about this Journal
Abstract
User authentication and access control are two important components in high security applications. Recently, Chen and Yeh proposed a method to integrate both of them seamlessly. However, Chen-Yeh's scheme is vulnerable to a stolen verifier attack, since it maintains a smart card identifier table in a remote server. Therefore, this paper modifies Chen-Yeh's scheme and propose a new integrated authentication and access control scheme that is resilient to the stolen verifier attack while inheriting all the merits of Chen-Yeh's scheme. Security analysis shows that the proposed scheme withstands well-known security attacks and exhibits many good features.
Keywords
user authentication; access control; smart card; SVA(stolen verifier attack);
Citations & Related Records
연도 인용수 순위
  • Reference
1 K. C. Leung, L. M. Cheng, A. S. Fong, C. K. Chan, Cryptanalysis of a modified remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics 49 (4) (2003), 1243-1245.   DOI   ScienceOn
2 J. J. Shen, C. W. Lin, M. S. Hwang, A modified remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics 49 (2) (2003), 414-416.   DOI   ScienceOn
3 B. Wang, Z.-Q. Li, A forward-secure user authentication scheme with smart cards, International Journal of Network Security 3 (2) (2006), 116-119.
4 B. W. Lampson, Protection, ACM Operating Systems Review 8 (1) (1974), 18-24.   DOI
5 R. Sandhu, P. Samarati, Access control: principles and practice, IEEE Communications 32 (2) (1994), 40-48.
6 N. Y. Lee, Integrating access control with user authentication using smart cards, IEEE Transactions on Consumer Electronics, 46 (4) (2000), 943-948.   DOI   ScienceOn
7 H. Y. Chien, J. K. Jan, An integrated user authentication and access control scheme without public key cryptography, Proceedings of IEEE 37th Annual International Carnahan Conference on Security Technology (2003), 137-143.
8 Y. Chen, L. Yeh, An efficient authentication and access control scheme using smart cards, Proceedings of 11th International Conference on Parallel and Distributed Systems (2005), 78-82.
9 J. K. Jan, Y. M. Tseng, Two integrated schemes of user authentication and access control in a distributed computer network, IEE Proceedings of Computers and Digital Techniques 145 (6) (1998), 419-424.
10 X. Chengqiang, Z. Zhenli, An integrated one-timepassword and access control authentication scheme, IEEE Proceedings of 3rd International Conference on Computer Science and Information Technology (2010), 252-254.
11 J. Jeong, M. Chung, H. Choo, Integrated OTP-based user authentication and access control scheme in home networks, Lecture Notes in Computer Science 4773 (2007), 123-133.
12 L. Lamport, Password authentication with insecure communication, CACM 24 (1981), 770-772.   DOI   ScienceOn
13 X. Tian, R. Zhu, D. Wong, Improved efficient remote user authentication schemes, International Journal of Network Security 4 (2) (2007), 149-154.
14 R. R. Ahirwal, Y. K. Jain, An efficient smart card based remote user authentication scheme using hash function, Proceedings of 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science (2012), 1-4.
15 M. Kumar, An enhanced remote user authentication scheme with smart card, International Journal of Network Security 10 (3) (2010), 175-184.
16 D. Wang, C. Ma, P, Wu, Secure password-based remote user authentication scheme with non-tamper resistant smart cards, Lecture Notes in Computer Science 7371 (2012), 114-121.   DOI   ScienceOn
17 C. L. Hsu, Security of Chien et al.'s remote user authentication scheme using smart cards, Computer Standards and Interfaces 26 (3) (2004), 167-169.   DOI   ScienceOn
18 S. W. Lee, H. S. Kim, K. Y. Yoo, Improvement of Chien et al.'s remote user authentication scheme using smart cards, Computer Standards and Interfaces 27 (2005), 181-183.   DOI   ScienceOn