Remote scheme for password authentication based on cross-product

被引:0
|
作者
Tan, Kaijun
He, Chen
Zhu, Hongwen
机构
来源
关键词
Computer networks - Information retrieval systems - Smart cards - Telecommunication systems;
D O I
暂无
中图分类号
学科分类号
摘要
A remote password authentication scheme based on cross-product is presented. In this scheme, and legal user can freely choose his own passwor in the initialization phase of the smart card. Using password and smart card, one can log into the remote system successfully. According to the analysis, intruders can not obtain any secret information from the public information or transmitted messages and impersonate another legal user. In addition, this scheme can withstand the attack of replaying previously intercepted log-in requests. The amount of computation in this scheme are smaller than that in C-H scheme.
引用
收藏
页码:28 / 30
相关论文
共 50 条
  • [1] Remote password authentication scheme based on cross-product
    Tan, K
    Zhu, H
    [J]. COMPUTER COMMUNICATIONS, 1999, 22 (04) : 390 - 393
  • [2] Simple remote password authentication scheme
    Shi, Ronghua
    Hu, Xiangling
    [J]. Jisuanji Gongcheng/Computer Engineering, 24 (09): : 43 - 44
  • [3] Cryptanalysis of a remote password authentication scheme
    Chan, CK
    Cheng, LM
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2001, 78 (03) : 323 - 326
  • [4] A REMOTE PASSWORD AUTHENTICATION SCHEME BASED UPON ELGAMALS SIGNATURE SCHEME
    CHANG, CC
    LIAO, WY
    [J]. COMPUTERS & SECURITY, 1994, 13 (02) : 137 - 144
  • [5] Remote scheme for password authentication based on theory of quadratic residues
    Chang, CC
    Tsu, SM
    Chen, CY
    [J]. COMPUTER COMMUNICATIONS, 1995, 18 (12) : 936 - 942
  • [6] A remote password authentication scheme based on the digital signature method
    Hwang, MS
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 1999, 70 (04) : 657 - 666
  • [7] A Threshold Secret Sharing Scheme Based on Cross-Product
    Qu, Juan
    Zhang, Jian-zhong
    [J]. PROCEEDINGS OF 2010 ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION, VOLS 1 AND 2, 2010, : 1015 - 1017
  • [8] An enhanced smart card based remote user password authentication scheme
    Li, Xiong
    Niu, Jianwei
    Khan, Muhammad Khurram
    Liao, Junguo
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (05) : 1365 - 1371
  • [9] A Novel Remote Authentication Scheme Based-On Password for Anonymous Users
    Ma Ying
    Li Guowei
    Zhang Laomo
    [J]. INFORMATION AND BUSINESS INTELLIGENCE, PT I, 2012, 267 : 187 - +
  • [10] Remote Login Password authentication Scheme based on Cuboid Using Biometric
    Kumari, Shipra
    Om, Hari
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT), 2014, : 190 - 194