A REMOTE PASSWORD AUTHENTICATION SCHEME BASED UPON ELGAMALS SIGNATURE SCHEME

被引:32
|
作者
CHANG, CC
LIAO, WY
机构
[1] Institute of Computer Science and Information Engineering, National Chung Cheng University, Chiayi
关键词
PASSWORD AUTHENTICATION; CHINESE REMAINDER THEOREM (CRT); DIGITAL SIGNATURE; DISCRETE LOGARITHMS; ONE-WAY FUNCTION; TIMESTAMP; SMART CARDS;
D O I
10.1016/0167-4048(94)90063-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A conventional password authentication scheme requires password files or verification tables which cannot withstand an attack of replying previously intercepted passwords by an intruder. In this paper, we propose a new password authentication scheme which is based on ElGamal's signature scheme. This scheme is suitable for applications which make use of passwords that are sent from remote locations. Our scheme can verify remote passwords using neither password files nor verification tables. Our password authentication scheme has three phases: (1) the computer system issues a smart card and a password according to the ID submitted by the registering user; (2) the login procedure is invoked; and (3) the password authentication procedure is invoked. We have also analyzed the security of this newly proposed remote password authentication scheme.
引用
收藏
页码:137 / 144
页数:8
相关论文
共 50 条
  • [41] A Security Improved Remote Password Authentication Scheme using Smart Card
    Jing, Chao
    [J]. EQUIPMENT MANUFACTURING TECHNOLOGY AND AUTOMATION, PTS 1-3, 2011, 317-319 : 1791 - 1796
  • [42] Cryptanalysis and Enhancement of a Password-Based Authentication Scheme
    Eldefrawy, Mohamed H.
    Al-Muhtadi, Jalal F.
    [J]. 2015 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2015, : 548 - 551
  • [43] Time-bounded based password authentication scheme
    Chang, CC
    Kuo, JY
    Lee, JS
    [J]. 2005 INTERNATIONAL CONFERENCE ON CYBERWORLDS, PROCEEDINGS, 2005, : 117 - 122
  • [44] An enhancement of timestamp-based password authentication scheme
    Fan, L
    Li, JH
    Zhu, HW
    [J]. COMPUTERS & SECURITY, 2002, 21 (07) : 665 - 667
  • [45] A Hybrid Password Authentication Scheme Based on Shape and Text
    Zheng, Ziran
    Liu, Xiyu
    Yin, Lizi
    Liu, Zhaocheng
    [J]. JOURNAL OF COMPUTERS, 2010, 5 (05) : 765 - 772
  • [46] Hash Chain based Strong Password Authentication Scheme
    Jan, Muhammad Shahzad
    Afzal, Mehreen
    [J]. 2016 13TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2016, : 355 - 360
  • [47] A password based authentication scheme for wireless multimedia systems
    Nishant Doshi
    Saru Kumari
    Dheerendra Mishra
    Xiong Li
    Kim-Kwang Raymond Choo
    Arun Kumar Sangaiah
    [J]. Multimedia Tools and Applications, 2017, 76 : 25893 - 25918
  • [48] Password authentication schemes based upon digital signature schemes
    Qi, Ming
    Zhang, Ling
    Tang, Shaohua
    Xiao, Guozhen
    [J]. Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 18 (11): : 43 - 49
  • [49] Cryptanalysis of a timestamp-based password authentication scheme
    Chan, Chi-Kwong
    Cheng, L.M.
    [J]. Computers and Security, 2001, 21 (01): : 74 - 76
  • [50] Cryptanalysis of a timestamp-based password authentication scheme
    Chan, CK
    Cheng, LM
    [J]. COMPUTERS & SECURITY, 2002, 21 (01) : 74 - 76