Article ID Journal Published Year Pages File Type
9506348 Applied Mathematics and Computation 2005 13 Pages PDF
Abstract
In 2000, Hwang and Yeh presented an improved version of Peyravian and Zunic's scheme by using the server's public key. In 2003, Lin and Hwang indicated that Hwang and Yeh's scheme suffers from the denial-of-service attack and proposed a password authentication scheme with secure password updating. However, the verification table needed in both Hwang and Yeh's and Lin and Hwang's schemes makes these schemes vulnerable to the stolen-verifier attack. To overcome their drawback, we propose two authentication schemes with no verification table in this paper.
Related Topics
Physical Sciences and Engineering Mathematics Applied Mathematics
Authors
, ,