Adapting a Novel Dual Authentication Method based on Smart Cards
نویسندگان
چکیده
In this paper, adapting a novel dual authentication method based on smart cards in public networks is proposed. This method uses the ElGamal public key cryptosystem and extend Chaum–van Antwerpen’s scheme to authenticate a signature between the signer and verifier using a dual protocol with a smart card that has tamper-resistant features. We propose the method to change the verification and disavowal protocol in Chaum–van Antwerpen’s scheme to authenticate both the signer and verifier. With these modifications, attempts to reject or deny a valid signature between the signer and verifier can be prevented or detected with high efficiency
منابع مشابه
An efficient remote use authentication scheme using smart cards
Based on the discrete logarithm problem, Hwaiig and Li [ 11 proposed a remote user authentication scheme using smart cards. In this paper, we fiirther propose an efficient and practical remote user authentication scheme using smart cards. The proposed scheme not only provides the same advantages as that of Hwang and Li's scheme, but also significantly reduces the communication and computation c...
متن کاملChaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications
Mobile users can roam into foreign networks and transmit messages to foreign agents, and they can access the services provided by a foreign agent by using their mobile devices. Thus, mobile user authentication and key agreement for wireless communications are becoming more and more important. In recent years, most of the existing user authentication and key-agreement protocols with smart cards ...
متن کاملBiometric User Authentication on Smart Cards by Means of Handwritten Signatures
This paper describes a biometric method for user authentication on smart cards. Smart cards are chip cards with the ability for data processing directly on the card. They are not only usable for storing biometric reference data, but biometric user authentication methods can also be performed on card in order to protect security-relevant functions or data on the cards. The biometric data under c...
متن کاملEfficient Statistical Zero-Knowledge Authentication Protocols for Smart Cards Secure Against Active & Concurrent Attacks
We construct statistical zero-knowledge authentication protocols for smart cards based on general assumptions. The main protocol is only secure against active attacks, but we present a modification based on trapdoor commitments that can resist concurrent attacks as well. Both protocols are instantiated using lattice-based primitives, which are conjectured to be secure against quantum attacks. W...
متن کاملImproving the Password-Based Authentication against Smart Card Security Breach
Password-based authentications using smart cards are very necessary between login users and a remote server. Smart card security breach threatens the security of password-based authentication schemes with smart cards. A password-based authentication scheme with smart cards against smart card security breach was proposed by C.T. Li et al. recently. However, it is noted that Li et al.'s scheme ne...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013