About this Journal Submit a Manuscript Table of Contents
BioMed Research International
Volume 2013 (2013), Article ID 491289, 9 pages
http://dx.doi.org/10.1155/2013/491289
Research Article

An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity

1King Saud University, P.O. Box 92144, Riyadh 11653, Saudi Arabia
2Department of Mathematics, Agra College, Agra, Dr. B. R. A. University, Agra, Uttar Pradesh 282002, India

Received 4 August 2013; Accepted 2 September 2013

Academic Editor: Sabah Mohammed

Copyright © 2013 Muhammad Khurram Khan and Saru Kumari. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. L. Lamport, “Password authentication with insecure communication,” Communications of the ACM, vol. 24, no. 11, pp. 770–772, 1981. View at Publisher · View at Google Scholar · View at Scopus
  2. N. M. Haller, “The S/KEY one-time password system,” RFC1760, February 1995.
  3. G. Horng, “Password authentication without using a password table,” Information Processing Letters, vol. 55, no. 5, pp. 247–250, 1995. View at Scopus
  4. J.-K. Jan and Y.-Y. Chen, “‘Paramita wisdom’ password authentication scheme without verification tables,” The Journal of Systems and Software, vol. 42, no. 1, pp. 45–57, 1998. View at Scopus
  5. M.-S. Hwang and L.-H. Li, “A new remote user authentication scheme using smart cards,” IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp. 28–30, 2000. View at Publisher · View at Google Scholar · View at Scopus
  6. W.-C. Ku and S.-M. Chen, “Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards,” IEEE Transactions on Consumer Electronics, vol. 50, no. 1, pp. 204–207, 2004. View at Publisher · View at Google Scholar · View at Scopus
  7. C.-I. Fan, Y.-C. Chan, and Z.-K. Zhang, “Robust remote authentication scheme with smart cards,” Computers and Security, vol. 24, no. 8, pp. 619–628, 2005. View at Publisher · View at Google Scholar · View at Scopus
  8. J.-Y. Liu, A.-M. Zhou, and M.-X. Gao, “A new mutual authentication scheme based on nonce and smart cards,” Computer Communications, vol. 31, no. 10, pp. 2205–2209, 2008. View at Publisher · View at Google Scholar · View at Scopus
  9. M. Kumar, M. K. Gupta, and S. Kumari, “An improved efficient remote password authentication scheme with smart card over insecure networks,” International Journal of Network Security, vol. 13, no. 3, pp. 167–177, 2011.
  10. M. Kumar, M. K. Gupta, and S. Kumari, “An improved smart card based remote user authentication scheme with session key agreement during the verification phase,” Journal of Applied Computer Science & Mathematics, vol. 11, no. 5, pp. 38–46, 2011.
  11. S. Kumari, M. K. Gupta, and M. Kumar, “Cryptanalysis and security enhancement of Chen et al.’s remote user authentication scheme using smart card,” Central European Journal of Computer Science, vol. 2, no. 1, pp. 60–75, 2012.
  12. S. Kumari, F. B. Muhaya, M. K. Khan, and R. Kumar, “Cryptanalysis of ‘a robust smart-card-based remote user password authentication scheme’,” in Proceedings of the International Symposium on Biometrics and Security Technologies, Chengdu, China, July 2013.
  13. S. Kumari and M. K. Khan, “Cryptanalysis and improvement of ‘a robust smart-card-based remote user password authentication scheme’,” International Journal of Communication Systems, 2013. View at Publisher · View at Google Scholar
  14. J. K. Lee, S. R. Ryu, and K. Y. Yoo, “Fingerprint-based remote user authentication scheme using smart cards,” Electronics Letters, vol. 38, no. 12, pp. 554–555, 2002. View at Publisher · View at Google Scholar · View at Scopus
  15. C.-H. Lin and Y.-Y. Lai, “A flexible biometrics remote user authentication scheme,” Computer Standards and Interfaces, vol. 27, no. 1, pp. 19–23, 2004. View at Publisher · View at Google Scholar · View at Scopus
  16. M. K. Khan and J. Zhang, “Improving the security of ‘a flexible biometrics remote user authentication scheme’,” Computer Standards and Interfaces, vol. 29, no. 1, pp. 82–85, 2007. View at Publisher · View at Google Scholar · View at Scopus
  17. M. K. Khan, J. Zhang, and X. Wang, “Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices,” Chaos, Solitons & Fractals, vol. 35, no. 3, pp. 519–524, 2008. View at Publisher · View at Google Scholar · View at Scopus
  18. M. K. Khan, “Fingerprint biometric-based self-authentication and deniable authentication schemes for the electronic world,” IETE Technical Review, vol. 26, no. 3, pp. 191–195, 2009. View at Publisher · View at Google Scholar · View at Scopus
  19. C.-T. Li and M.-S. Hwang, “An efficient biometrics-based remote user authentication scheme using smart cards,” Journal of Network and Computer Applications, vol. 33, no. 1, pp. 1–5, 2010. View at Publisher · View at Google Scholar · View at Scopus
  20. M. K. Khan, S. Kumari, and M. K. Gupta, “More efficient key-hash based fingerprint remote authentication scheme using mobile device,” Computing, 2013. View at Publisher · View at Google Scholar
  21. M. K. Khan, S.-K. Kim, and K. Alghathbar, “Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’,” Computer Communications, vol. 34, no. 3, pp. 305–309, 2011. View at Publisher · View at Google Scholar · View at Scopus
  22. M. Kumar, M. K. Gupta, and S. Kumari, “Cryptanalysis of enhancements of a password authentication scheme over insecure networks,” in Proceedings of the 4th International Conference on Contemporary Computing (IC3 '11), vol. 168, pp. 524–532, Noida, India, 2011.
  23. M. K. Khan, S. Kumari, and M. K. Gupta, “Further cryptanalysis of ‘a remote authentication scheme using mobile device’,” in Proceedings of the 4th International Conference on Computational Aspects of Social Networks (CASoN '12), pp. 234–237, Sao Carlos, Brazil, November 2012.
  24. S. Kumari, M. K. Gupta, M. K. Khan, and F. T. B. Muhaya, “Cryptanalysis of ‘an improved timestamp-based remote user authentication scheme’,” in Proceedings of the International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering (ICQR2MSE '12), pp. 1439–1442, Chengdu, China, June 2012.
  25. S. Kumari, M. K. Khan, and R. Kumar, “Cryptanalysis and improvement of ‘a privacy enhanced scheme for telecare medical information systems’,” Journal of Medical Systems, vol. 37, no. 4, article 9952, 2013. View at Publisher · View at Google Scholar
  26. A. K. Das, “Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards,” IET Information Security, vol. 5, no. 3, pp. 145–151, 2011. View at Publisher · View at Google Scholar · View at Scopus
  27. Y. An, “Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards,” Journal of Biomedicine and Biotechnology, vol. 2012, Article ID 519723, 6 pages, 2012. View at Publisher · View at Google Scholar
  28. P. Kocher, J. Jaffe, and B. Jun, “Differential power analysis,” in Advances in Cryptology—CRYPTO’ 99, pp. 388–397, Springer, Berlin, Germany, 1999.
  29. T. S. Messerges, E. A. Dabbish, and R. H. Sloan, “Examining smart-card security under the threat of power analysis attacks,” IEEE Transactions on Computers, vol. 51, no. 5, pp. 541–552, 2002. View at Publisher · View at Google Scholar · View at Scopus