{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:49:16Z","timestamp":1777704556229,"version":"3.51.4"},"reference-count":25,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2018,8,17]],"date-time":"2018-08-17T00:00:00Z","timestamp":1534464000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2018,11,20]]},"abstract":"<jats:p>Most of the user authentication schemes are based on smart cards; however, a smart card requires additional infrastructure that includes card reader, leading to more deployment cost. Recently, Kumari et al. have discussed a user anonymous authentication scheme that uses common storage device such as USB stick, mobile phone, etc. rather than using a smart card. The common storage device is used to store some authentication information issued by the server. We cryptanalyze the Kumari et al.\u2019s scheme and find that it is not resistant to the device stolen, privileged insider and denial of service attacks. In this paper, we propose a user authentication scheme based on public key cryptography to overcome its drawbacks. We show its formal security analysis using random oracle model and discuss its informal security analysis to show that it is resistant to the various known attacks. We simulate it using the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool for its formal security verification. We compare our scheme with the related schemes and show that it has better communication cost and provides more security features.<\/jats:p>","DOI":"10.3233\/jifs-169820","type":"journal-article","created":{"date-parts":[[2018,8,17]],"date-time":"2018-08-17T11:19:33Z","timestamp":1534504773000},"page":"5379-5390","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["A PKC-based user authentication scheme without smart card"],"prefix":"10.1177","volume":"35","author":[{"given":"Devender","family":"Kumar","sequence":"first","affiliation":[{"name":"Division of Information Technology, NSIT, New Delhi, India"}]},{"given":"Satish","family":"Chand","sequence":"additional","affiliation":[{"name":"School of Computer and System Sciences, JNU, New Delhi, India"}]},{"given":"Bijendra","family":"Kumar","sequence":"additional","affiliation":[{"name":"Division of Computer Engineering, NSIT, New Delhi, India"}]}],"member":"179","published-online":{"date-parts":[[2018,8,17]]},"reference":[{"key":"e_1_3_1_2_2","unstructured":"AVISPA. Automated Validation of Internet Security Protocols and Applications http:\/\/www.avispa-project.org\/ Online; Accessed on December 2016."},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-015-0318-z"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.05.009"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.5755\/j01.itc.41.1.975"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00415-7"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-015-0218-2"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-014-0324-9"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.03.006"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.5755\/j01.itc.42.2.2554"},{"issue":"6","key":"e_1_3_1_13_2","first-page":"2431","article-title":"Security analysis and improvement of the remote user authentication scheme without using smart cards","volume":"4","author":"Horng W.-B.","year":"2010","unstructured":"HorngW.-B., ShiehW.-G., et al., Security analysis and improvement of the remote user authentication scheme without using smart cards, ICIC Express Letters4(6 pt. B) (2010), 2431\u20132436.","journal-title":"ICIC Express Letters"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.5755\/j01.itc.42.2.2079"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2006.01.002"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2590"},{"key":"e_1_3_1_17_2","unstructured":"KumariS. KhanM.K. LiX. and WuF. Design of a user anonymous password authentication scheme without smart card International Journal of Communication Systems (2016)."},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.02.002"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2602282"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2007.11.017"},{"key":"e_1_3_1_22_2","doi-asserted-by":"crossref","unstructured":"TanZ. Security analysis of two password authentication schemes. In Mobile Business 2009. ICMB 2009. Eighth International Conference on 2009 pp. 296\u2013300.","DOI":"10.1109\/ICMB.2009.57"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2605087"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2006.11.005"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.07.062"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2004.1309437"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169820","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-169820","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169820","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:41:28Z","timestamp":1777455688000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-169820"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,17]]},"references-count":25,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,11,20]]}},"alternative-id":["10.3233\/JIFS-169820"],"URL":"https:\/\/doi.org\/10.3233\/jifs-169820","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,17]]}}}