1st International ICST Workshop on Multimedia Security in Communication

Research Article

An Enhanced Verifier-Free Password Authentication Scheme for Resource-Limited Environments

  • @INPROCEEDINGS{10.1109/CHINACOM.2008.4685259,
        author={Wei-Chi Ku and Hao-Rung Chung and Maw-Jinn Tsaur and Szu-Yao Wang},
        title={An Enhanced Verifier-Free Password Authentication Scheme for Resource-Limited Environments},
        proceedings={1st International ICST Workshop on Multimedia Security in Communication},
        publisher={IEEE},
        proceedings_a={MUSIC},
        year={2008},
        month={11},
        keywords={authentication; mulitmedia; password; reparability; verification table.},
        doi={10.1109/CHINACOM.2008.4685259}
    }
    
  • Wei-Chi Ku
    Hao-Rung Chung
    Maw-Jinn Tsaur
    Szu-Yao Wang
    Year: 2008
    An Enhanced Verifier-Free Password Authentication Scheme for Resource-Limited Environments
    MUSIC
    IEEE
    DOI: 10.1109/CHINACOM.2008.4685259
Wei-Chi Ku1,*, Hao-Rung Chung2,*, Maw-Jinn Tsaur3,*, Szu-Yao Wang1,*
  • 1: Department of Computer and Information Science, National Taichung University, Taichung, Taiwan
  • 2: Department of Computer Science and Information Engineering, Fu Jen Catholic University, Taipei, Taiwan
  • 3: Graduate Institute of Applied Science and Engineering, Fu Jen Catholic University, Taipei, Taiwan
*Contact email: wcku@ms3.ntcu.edu.tw, wcku@ms22.hinet.net, wcku@mail.ntcu.edu.tw, wcku@csie.fju.edu.tw

Abstract

To realize secure access to multimedia anywhere, anytime, and with any devices, we need efficient authentication mechanisms suitable for resource-limited environments. Password authentication is regarded as one of the most widely used authentication mechanisms for its convenience, easy implementation, and user-friendliness. Up to now, many verifier-free password authentication schemes that can resist stolen-verifier attacks have been proposed, and each has its pros and cons. Recently, Wang et al. showed that two new verifier-free password authentication schemes are vulnerable to an off-line password guessing attack, a forgery attack, and a denial-of-service attack, and then proposed an improved scheme for the real application in resource-limited environments. Unfortunately, we find that Wang et al.’s scheme is still vulnerable to several attacks. Herein, we propose an enhanced verifier-free password authentication scheme for resource-limited environments with better security strength.