On the analysis and design of a family tree of smart card based user authentication schemes

Raphael C.W. Phan, Bok Min Goi

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Abstract

A family (tree) of 2-party password-based authentication protocols based on smart cards abounds in security literature, more popularly known as remote user authentication schemes using smart cards. In this paper, we give a generic treatment to the security and analyses of such protocols, tracing back to the original versions due to Hwang et al. and Hwang-Li from which many variants have been derived. Our work here highlights the security implications of taking the break-and-tweak approach to protocol design.

Original languageEnglish
Title of host publicationUbiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings
PublisherSpringer
Pages1213-1221
Number of pages9
ISBN (Print)9783540735489
DOIs
Publication statusPublished - 2007
Externally publishedYes
EventInternational Conference on Ubiquitous and Intelligence Computing 2007 - Hong Kong, China
Duration: 11 Jul 200713 Jul 2007
Conference number: 4th
https://link.springer.com/book/10.1007%2F978-3-540-73549-6 (Proceedings)

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4611 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceInternational Conference on Ubiquitous and Intelligence Computing 2007
Abbreviated titleUIC 2007
Country/TerritoryChina
CityHong Kong
Period11/07/0713/07/07
Internet address

Cite this