<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article"><front><journal-meta><journal-id journal-id-type="publisher-id">INFORMATICA</journal-id><journal-title-group><journal-title>Informatica</journal-title></journal-title-group><issn pub-type="epub">0868-4952</issn><issn pub-type="ppub">0868-4952</issn><publisher><publisher-name>VU</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">inf18102</article-id><article-id pub-id-type="doi">10.15388/Informatica.2007.160</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research article</subject></subj-group></article-categories><title-group><article-title>A Secure YS-Like User Authentication Scheme</article-title></title-group><contrib-group><contrib contrib-type="Author"><name><surname>Chen</surname><given-names>Tzung-Her</given-names></name><email xlink:href="mailto:thchen@mail.ncyu.edu.tw">thchen@mail.ncyu.edu.tw</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/></contrib><contrib contrib-type="Author"><name><surname>Horng</surname><given-names>Gwoboa</given-names></name><xref ref-type="aff" rid="j_INFORMATICA_aff_001"/></contrib><contrib contrib-type="Author"><name><surname>Wu</surname><given-names>Ke-Chiang</given-names></name><xref ref-type="aff" rid="j_INFORMATICA_aff_001"/></contrib><aff id="j_INFORMATICA_aff_000">Department of Computer Science and Information Engineering, National Chiayi University, 300 University Road, Chia-Yi City, Taiwan 600, R.O.C.</aff><aff id="j_INFORMATICA_aff_001">Institute of Computer Science, National Chung-Hsing University, 250 Kuo-Kuang Road, Taichung 402, Taiwan, R.O.C.</aff></contrib-group><pub-date pub-type="epub"><day>01</day><month>01</month><year>2007</year></pub-date><volume>18</volume><issue>1</issue><fpage>27</fpage><lpage>36</lpage><history><date date-type="received"><day>01</day><month>08</month><year>2005</year></date></history><abstract><p>Recently, there are several articles proposed based on Yang and Shieh's password authentication schemes (YS for short) with the following features: (1) A user can choose password freely. (2) The server does not need to maintain a password table. (3) There is no need to involve a trusted third party. Although there were several variants of the YS-like schemes claimed to address the forgery attacks, this paper analyzes their security and shows that they still suffer from forgery attacks. Furthermore, a new scheme based on the concept of message authentication is proposed to foil the forgery attack.</p></abstract><kwd-group><label>Keywords</label><kwd>remote user authentication</kwd><kwd>forgery attack</kwd><kwd>password</kwd><kwd>smart card</kwd><kwd>message authentication</kwd><kwd>mutual authentication</kwd></kwd-group></article-meta></front></article>