{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T15:40:23Z","timestamp":1717947623096},"reference-count":43,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T00:00:00Z","timestamp":1515974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their claims were such that their schemes defended against ID-theft attacks, reply attacks, undetectable on-line password guessing attacks, off-line password guessing attacks, user impersonation attack, server counterfeit attack and man-in-the-middle attack. In this paper, we show that Yeh et al.\u2019s schemes are still vulnerable to ID-theft attack, off-line password guessing attacks, undetectable on-line password guessing attacks and user impersonation attack. Notably, problems remain in situations where the user lost a smart card or the malicious legal user. To remedy these flaws, this paper proposes an improvement on Yeh et al.\u2019s remote user authentication schemes using smart cards.<\/jats:p>","DOI":"10.3390\/computers7010009","type":"journal-article","created":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T17:30:36Z","timestamp":1516037436000},"page":"9","source":"Crossref","is-referenced-by-count":5,"title":["An Improvement on Remote User Authentication Schemes Using Smart Cards"],"prefix":"10.3390","volume":"7","author":[{"given":"Chin-Ling","family":"Chen","sequence":"first","affiliation":[{"name":"Department of Computer Science and Information Engineering, Chaoyang University of Technology, Taichung 41349, Taiwan"},{"name":"School of Information Engineering, Changchun Sci-Tech University, Changchun 130600, China"}]},{"given":"Yong-Yuan","family":"Deng","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, Chaoyang University of Technology, Taichung 41349, Taiwan"}]},{"given":"Yung-Wen","family":"Tang","sequence":"additional","affiliation":[{"name":"School of Physical Therapy, Chun Shan Medical University, Taichung 40201, Taiwan"}]},{"given":"Jung-Hsuan","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Industrial Education, National Taiwan Normal University, Taipei 10610, Taiwan"}]},{"given":"Yu-Fan","family":"Lin","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, Chaoyang University of Technology, Taichung 41349, Taiwan"}]}],"member":"1968","published-online":{"date-parts":[[2018,1,15]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","article-title":"Password authentication with insecure communication","volume":"24","author":"Lamport","year":"1981","journal-title":"ACM Commun."},{"key":"ref_2","unstructured":"Argyroudis, P.G., Verma, R., Tewari, H., and O\u2019Mahony, D. (September, January 30). Performance analysis of cryptographic protocols on handheld devices. Proceedings of the 3rd International Symposium on Network Computing and Applications, Cambridge, MA, USA."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1246","DOI":"10.1109\/TCE.2003.1261225","article-title":"A remote user authentication scheme using smart cards with forward secrecy","volume":"49","author":"Awasthi","year":"2003","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","article-title":"Entity authentication and key distribution","volume":"Volume 773","author":"Bellare","year":"1993","journal-title":"Advances in Cryptology\u2014CRYPTO\u201993, LNCS"},{"key":"ref_5","unstructured":"Chien, H.Y., and Chen, C.H. (2005, January 28\u201330). A remote authentication scheme preserving user anonymity. Proceedings of the 19th International Conference on Advanced Information Networking and Applications, Taipei, Taiwan."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1109\/TCE.2004.1309441","article-title":"A dynamic ID-based remote user authentication scheme","volume":"50","author":"Das","year":"2004","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1145\/219282.219298","article-title":"Undetectable on-line password guessing attacks","volume":"29","author":"Ding","year":"1995","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Duan, X., Liu, J.W., and Zhang, Q. (2006, January 3\u20136). Security improvement on Chien et al.\u2019s remote user authentication scheme using smart cards. Proceedings of the IEEE International Conference on Computational Intelligence and Security, Guangzhou, China.","DOI":"10.1109\/ICCIAS.2006.295440"},{"key":"ref_9","unstructured":"Gao, Z.X., and Tu, Y.Q. (2008, January 25\u201327). An improvement of dynamic ID-based remote user authentication scheme with smart cards. Proceedings of the 7th World Congress on Intelligent Control and Automation, Chongqing, China."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/130704.130709","article-title":"A security risk of depending on synchronized clocks","volume":"26","author":"Gong","year":"1992","journal-title":"ACM Oper. Syst. Rev."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1016\/j.comcom.2008.11.019","article-title":"Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards","volume":"32","author":"Hsiang","year":"2009","journal-title":"Comput. Commun."},{"key":"ref_12","unstructured":"Hwang, T., Chen, Y., and Laih, C.S. (1990, January 24\u201327). Non-interactive password authentication without password tables. Proceedings of the IEEE Region 10 Conference on Computer and Communication Systems, Hong Kong, China."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/j.jss.2009.07.050","article-title":"DoS-resistant ID-based password authentication scheme using smart cards","volume":"83","author":"Hwang","year":"2010","journal-title":"J. Syst. Softw."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/30.826377","article-title":"A new remote user authentication scheme using smart cards","volume":"46","author":"Hwang","year":"2000","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_15","first-page":"388","article-title":"Differential power analysis","volume":"Volume 1666","author":"Kocher","year":"1999","journal-title":"Advances in Cryptology: Proceedings of CRYPTO 99, LNCS"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"2165","DOI":"10.1093\/ietcom\/e88-b.5.2165","article-title":"Impersonation attack on a dynamic ID-based remote user authentication scheme using smart cards","volume":"E88-B","author":"Ku","year":"2005","journal-title":"IEICE Trans. Commun."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1145\/567331.567335","article-title":"A flexible remote user authentication scheme using smart cards","volume":"36","author":"Lee","year":"2002","journal-title":"ACM Oper. Syst. Rev."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1145\/583800.583803","article-title":"A remote user authentication scheme using hash functions","volume":"36","author":"Lee","year":"2002","journal-title":"ACM Oper. Syst. Rev."},{"key":"ref_19","unstructured":"Liao, I.E., Lee, C.C., and Hwang, M.S. (2005, January 22\u201326). Security enhancement for a dynamic ID-based remote user authentication scheme. Proceedings of the IEEE International Conference on Next Generation Web Services Practices, Seoul, Korea."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1167","DOI":"10.1016\/j.csi.2009.03.002","article-title":"Cryptanalysis of two three-party encrypted key exchange protocols","volume":"31","author":"Lo","year":"2009","journal-title":"Comput. Stand. Interfaces"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","article-title":"Examining smart-card security under the threat of power analysis attacks","volume":"51","author":"Messerges","year":"2002","journal-title":"IEEE Trans. Comput."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Misbahuddin, M., Ahmed, M.A., and Shastri, M.H. (2006, January 19\u201321). A simple and efficient solution to remote user authentication using smart cards. Proceedings of the Innovations in Information Technology, Dubai, UAE.","DOI":"10.1109\/INNOVATIONS.2006.301918"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"958","DOI":"10.1109\/30.920446","article-title":"An efficient remote user authentication scheme using smart cards","volume":"46","author":"Sun","year":"2000","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1109\/TCE.2003.1209534","article-title":"A modified remote user authentication scheme using smart cards","volume":"49","author":"Shen","year":"2003","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1016\/j.comcom.2008.11.008","article-title":"A more efficient and secure dynamic ID-based remote user authentication scheme","volume":"32","author":"Wang","year":"2009","journal-title":"Comput. Commun."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Xie, Q., Wang, J.L., Chen, D.R., and Yu, X.Y. (2008, January 12\u201314). A novel user authentication scheme using smart cards. Proceedings of the 2008 International Conference on Computer Science and Software Engineering, Hubei, China.","DOI":"10.1109\/CSSE.2008.1043"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"2556","DOI":"10.1016\/j.jss.2010.07.062","article-title":"Two robust remote user authentication protocols using smart cards","volume":"83","author":"Yeh","year":"2010","journal-title":"J. Syst. Softw."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1109\/TCE.2004.1309437","article-title":"Further improvement of an efficient password based remote user authentication scheme using smart cards","volume":"50","author":"Yoon","year":"2004","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Zhang, X., Feng, Q.Y., and Li, M. (2006, January 25\u201328). A modified dynamic ID-based remote user authentication scheme. Proceedings of the International Conference on Communications, Circuits and Systems, Guilin, China.","DOI":"10.1109\/ICCCAS.2006.284979"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"289","DOI":"10.15388\/Informatica.2003.022","article-title":"Some forgery attacks on a remote user authentication scheme using smart cards","volume":"14","author":"Chang","year":"2003","journal-title":"Informatics"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/S0895-7177(02)00106-1","article-title":"A simple remote user authentication scheme","volume":"36","author":"Hwang","year":"2002","journal-title":"Math. Comput. Model."},{"key":"ref_32","first-page":"1947","article-title":"Reparable key distribution protocols for Internet environments","volume":"43","author":"Hwang","year":"1995","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1109\/TCE.2004.1277863","article-title":"Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards","volume":"50","author":"Ku","year":"2004","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_34","first-page":"193","article-title":"A robust anonymous biometric-based remote user authentication scheme using smart cards","volume":"27","author":"Das","year":"2015","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"ref_35","first-page":"1","article-title":"An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card","volume":"21","author":"Odelu","year":"2015","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_36","first-page":"44","article-title":"Design of a lightweight two-factor authentication scheme with smart card revocation","volume":"23","author":"Mishra","year":"2015","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_37","first-page":"64","article-title":"Design of a secure smart card-based multi-server authentication scheme","volume":"30","author":"Chaturvedi","year":"2016","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_38","first-page":"59","article-title":"Security bound enhancement of remote user authentication using smart card","volume":"36","author":"Madhusudhan","year":"2017","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Jeon, J.C., Kang, B.H., Kim, S.M., Lee, W.S., and Yoo, K.Y. (2006, January 9\u201312). An improvement of remote user authentication scheme using smart cards. Proceedings of the International Conference on Mobile Ad-Hoc and Sensor Networks, Vancouver, BC, Canada.","DOI":"10.1007\/11943952_35"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","article-title":"A logic of authentication","volume":"8","author":"Burrows","year":"1990","journal-title":"ACM Trans. Comput. Syst."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1016\/j.comcom.2008.11.032","article-title":"Enhanced authentication scheme with anonymity for roaming service in global mobility networks","volume":"32","author":"Chang","year":"2009","journal-title":"Comput. Commun."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"1373","DOI":"10.1109\/TVT.2006.877704","article-title":"A novel privacy preserving authentication and access control scheme for pervasive computing environments","volume":"55","author":"Ren","year":"2006","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1016\/j.comcom.2010.05.010","article-title":"PPACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks","volume":"34","author":"Yeh","year":"2011","journal-title":"Comput. Commun."}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/7\/1\/9\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T15:16:25Z","timestamp":1717946185000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/7\/1\/9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,15]]},"references-count":43,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2018,3]]}},"alternative-id":["computers7010009"],"URL":"https:\/\/doi.org\/10.3390\/computers7010009","relation":{},"ISSN":["2073-431X"],"issn-type":[{"value":"2073-431X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,15]]}}}