8 research outputs found

    Cryptanalysis of recently proposed Remote User Authentication Schemes

    Get PDF
    Recently Manik et al. [13] proposed a novel remote user authentication scheme using bilinear pairings. Chou et al. [14] identified a weakness in Manik et al.’s scheme and made an improvement. In this paper, we show that both Manik et al.’s and Chou et al.’s schemes are insecure against forgery attack and replay attack

    Improvement of Manik et al.¡¦s remote user authentication scheme

    Get PDF
    In 2005, Manik et al. propose a novel remote user authentication scheme using bilinear pairings which allows a valid user to login to the remote system but prohibits too many users to login with the same login-ID. It also provides a flexible password change function. In this paper, we will show that this remote user authentication scheme is not secure, an adversary can always pass the authentication

    An Effective Authentication Scheme for Distributed Mobile Cloud Computing Services using a Single Private Key

    Get PDF
    Mobile cloud computing comprises of cloud computing, mobile computing and wireless network. Providing secure and convenience for the mobile users to access multiple cloud computing services is essential. This paper furnish an effective way of providing the authentication for the mobile users to access multiple cloud computing services. The proposed scheme outfit a secure and expediency for mobile users to access several cloud computing services from multiple service providers using a single private key. Our proposed scheme is based on bilinear pairing cryptosystem. In addition, the scheme also supports mutual authentication, key exchange, user anonymity. To overcome the vulnerabilities of traditional methods, from system implementation point of view, the proposed scheme eliminates the usage of verification tables that are required to store the user credentials(user ID and password) which are the part of smart card generator service and cloud computing service provider

    A novel remote user authentication scheme using bilinear pairings

    No full text
    The paper presents a remote user authentication scheme using the properties of bilinear pairings. In the scheme, the remote system receives user login request and allows login to the remote system if the login request is valid. The scheme prohibits the scenario of many logged in users with the same login-ID, and provides a flexible password change option to the registered users without any assistance from the remote system.© Elsevie

    A New Remote User Authentication Scheme based on Bilinear Pairings for Multi-server Environment

    No full text
    [[abstract]]With some properties of bilinear pairings, there have been active researches in cryptography.Recently, Das et al. proposed a novel remote user authentication scheme using bilinear pairings over elliptic curve. However, it does not agree with multi-server environment. In this paper, we propose a password authentication scheme based on bilinear pairings for multi-serve environment. Not only does our scheme achieve the efficient computation requirement for smart cards, but also it can construct a complete authentication scheme, including mutual authentication and session key agreement. Our scheme uses nonce instead of timestamp to withstand relay attacks. In addition, the remote server requires nothing about the secret key of the key distribution center (KDC) to authenticate the users. Our scheme also analyzes the security and compares the functionality with other schemes
    corecore