Remote scheme for password authentication based on cross-product

被引:0
|
作者
Tan, Kaijun
He, Chen
Zhu, Hongwen
机构
来源
关键词
Computer networks - Information retrieval systems - Smart cards - Telecommunication systems;
D O I
暂无
中图分类号
学科分类号
摘要
A remote password authentication scheme based on cross-product is presented. In this scheme, and legal user can freely choose his own passwor in the initialization phase of the smart card. Using password and smart card, one can log into the remote system successfully. According to the analysis, intruders can not obtain any secret information from the public information or transmitted messages and impersonate another legal user. In addition, this scheme can withstand the attack of replaying previously intercepted log-in requests. The amount of computation in this scheme are smaller than that in C-H scheme.
引用
收藏
页码:28 / 30
相关论文
共 50 条
  • [41] Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
    Ku, WC
    Chen, SM
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (01) : 204 - 207
  • [42] On the security of a dynamic identity-based remote user authentication scheme with verifiable password update
    Liu, Yongchun
    Gong, Peng
    Yan, Xiaopeng
    Li, Ping
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (05) : 842 - 847
  • [43] Geometric based remote password authentication using biometrics
    Om, Hari
    Reddy, M. Ramakrishna
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2013, 16 (4-5): : 207 - 220
  • [44] Improvement on a Smart Card Based Password Authentication Scheme
    He, Debiao
    Chen, Jianhua
    Hu, Jin
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2012, 13 (03): : 405 - 409
  • [45] Enhancement of a timestamp-based password authentication scheme
    School of Electronics and Information Engineering, Beijing University of Aeronautics and Astronautics, Beijing 100083, China
    [J]. Beijing Hangkong Hangtian Daxue Xuebao, 2007, 5 (577-579):
  • [46] A PASSWORD AUTHENTICATION SCHEME BASED ON DISCRETE LOGARITHMS - COMMENT
    SUN, CH
    WANG, SD
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 1993, 49 (1-2) : 29 - 32
  • [47] One-time password password authentication scheme based on the negative database
    Zhao, Dongdong
    Luo, Wenjian
    [J]. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2017, 62 : 396 - 404
  • [48] Cryptanalysis and Enhancement of a Password-Based Authentication Scheme
    Eldefrawy, Mohamed H.
    Al-Muhtadi, Jalal F.
    [J]. 2015 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2015, : 548 - 551
  • [49] Time-bounded based password authentication scheme
    Chang, CC
    Kuo, JY
    Lee, JS
    [J]. 2005 INTERNATIONAL CONFERENCE ON CYBERWORLDS, PROCEEDINGS, 2005, : 117 - 122
  • [50] An enhancement of timestamp-based password authentication scheme
    Fan, L
    Li, JH
    Zhu, HW
    [J]. COMPUTERS & SECURITY, 2002, 21 (07) : 665 - 667