JOURNAL ARTICLE

A Secure Dynamic Identity Based Remote User Authentication Scheme Using Secret Sharing

Yun LiuZi‐Yao ChengC. C. ChangZhenjiang Zhang

Year: 2012 Journal:   網際網路技術學刊 Vol: 13 (3)Pages: 463-469   Publisher: Taiwan Academic Network

Abstract

With the rapid growth of Internet based applications, strong privacy protection and robust system security have become essential requirements for an authentication scheme. Engineers have proposed many identity based authentication schemes for remote login systems in past decades. In recent years, the security mechanism for the dynamic identity of legal user appearance has become a new technology in the field of network communications. This novel technology has allowed us to conduct a more secure remote user authentication scheme using a smart card, in which the well-designed module has remedied the system drawback of a static identity based authentication scheme. However, many kinds of authentication schemes need a system of synchronized clocks to withstand replay attacks and achieve mutual authentication, and most of them cannot propose a lightweight mechanism to reduce implementation complexity and achieve computation efficiency. Therefore, we propose a new dynamic identity based authentication scheme using three-way challenge-response strategy to achieve mutual authentication without a system of synchronized clocks. It completely prevents various attacks, supports the session key agreement, and offers the functionality advantages. As a result, the proposed scheme seems to be more secure and suitable for remote communication environment with low computation consumption and better security attributes.

Keywords:
Computer science Mutual authentication Replay attack Authentication (law) Computer security Authentication protocol Session key Scheme (mathematics) Login Computer network Identity (music) Challenge–response authentication Smart card Encryption

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
0
Refs
0.25
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Advanced Authentication Protocols Security
Physical Sciences →  Computer Science →  Computer Networks and Communications
User Authentication and Security Systems
Physical Sciences →  Computer Science →  Information Systems
© 2026 ScienceGate Book Chapters — All rights reserved.