The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In 2012, Hsieh and Leu proposed a remote user authentication scheme. They use cryptographic hash functions to design their scheme. By designing a method to analyse one-way hash functions, we propose two attacks on their scheme. One is masquerade attack and another is guessing attack. In addition, we point out that their scheme provides no user anonymity and propose a remote user authentication scheme...
User authentication plays an important role to ensure that only authorized users can access resources. Kim et al. proposed a remote user authentication scheme based on the Rabin cryptosystem to resist well-known attack such as offline password guessing attack, unlimited online password guessing attack and server impersonation. In their scheme, a user will be issued a smart card for authentication,...
Security issues play an important role in modern communication worlds. Via distrusted networks, exchanged messages need to be encrypted by a session key for security requirements. Session keys are preferred to be generated by communication parties, and how to authenticate the other communication party is an important problem needed to be solved. In three-party encrypted key exchange (3PEKE) protocols,...
Radio frequency identification (RFID) is a popular technology, but some problems still need to be overcome. Hopper and Blum proposed a light-weight authentication protocol, HB protocol, which is especially suitable for devices with low computation ability such as passive RFID tags. Later, HB protocol was proven to be insecure, and Munilla and Peinado amended it by proposing HB-MP and HB-MP protocols...
OT (oblivious transfer) is an important e-commerce technique to make information buyers be able to get desired information and preserve privacy at the sametime. Recently, Kim et al. proposed two 1-out-of-2 NIOT (non-interactive OT) schemes. They claimed the message sender can be verified in their schemes. Unfortunately, their schemes are insecure. In this paper, we will make thorough discussions on...
A non-interactive oblivious transfer scheme based on the standard ElGamal encryption scheme was proposed in 2003. The retrieved messages could not be verified by the receiver so the authors proposed an amendment. Unfortunately, this amendment makes itself impracticable. In this article, an efficient and practical non-interactive t-out-of-n oblivious transfer scheme based on the widespread RSA cryptosystem...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.