Abstract

Remote authentication scheme utilising smart cards have become a prevalent concept due to their convenience and simplicity. Recently, Lee (2015) proposed a low cost authentication scheme without verifier tables. However, in this paper we show that Lee's scheme is susceptible to various attacks and fails to provide essential security properties. We then present our own scheme and perform an informal analysis to substantiate the claim that our scheme is able to resist the previous scheme's weaknesses.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call