An efficient password authentication scheme using smart card based on elliptic curve cryptography

Y Zhang, J Chen, B Huang, C Peng - Information Technology And Control, 2014 - itc.ktu.lt
Y Zhang, J Chen, B Huang, C Peng
Information Technology And Control, 2014itc.ktu.lt
Recently, Li proposed a new password authentication and user anonymity scheme based
on elliptic curve cryptography. In this paper, we will show that Li's scheme is vulnerable to
the impersonation attack and the denial of service attack. Moreover, we also point out that
there is an error in his scheme. To overcome the weaknesses of Li's scheme, we proposed
an efficient password authentication scheme based on elliptic curve cryptography. The
proposed scheme improves the security and efficiency of the authentication process.
Abstract
Recently, Li proposed a new password authentication and user anonymity scheme based on elliptic curve cryptography. In this paper, we will show that Li’s scheme is vulnerable to the impersonation attack and the denial of service attack. Moreover, we also point out that there is an error in his scheme. To overcome the weaknesses of Li’s scheme, we proposed an efficient password authentication scheme based on elliptic curve cryptography. The proposed scheme improves the security and efficiency of the authentication process.
itc.ktu.lt
Showing the best result for this search. See all results