REMOTE PASSWORD AUTHENTICATION WITH SMART CARDS

被引:216
|
作者
CHANG, CC [1 ]
WU, TC [1 ]
机构
[1] NATL CHIAO TUNG UNIV,INST COMP SCI & INFORMAT ENGN,HSINCHU 30043,TAIWAN
来源
关键词
CODES AND DECODING; CRYPTOGRAPHY; SECURITY;
D O I
10.1049/ip-e.1991.0022
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A remote password authentication scheme based on the Chinese remainder theorem is proposed. The scheme can verify the remote password without verification tables. In the initial phase, the password generation centre generates and assigns a password corresponding to each user. The ideas of smart cards and the identity-based signature scheme introduced by Shamir are employed in this phase. Each user possesses a smart card for later login and authentication. In the login phase, the user submits the identity and password associated with the smart card. In the authentication phase, the system verifies the remotely submitted password to check if the login request is accepted or rejected. A signature scheme and communication timestamps are provided in the authentication phase against the potential attacks of replaying a previously intercepted login request.
引用
收藏
页码:165 / 168
页数:4
相关论文
共 50 条
  • [31] Mutual authentication scheme with smart cards and password under trusted computing
    Yang, Li
    Ma, Jian-Feng
    Jiang, Qi
    [J]. International Journal of Network Security, 2012, 14 (03) : 156 - 163
  • [32] Efficient and complete remote authentication scheme with smart cards
    Shieh, Wen-Gong
    Horng, Wen-Bing
    [J]. ISI 2008: 2008 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2008, : 122 - +
  • [33] Cryptanalysis of two password-based authentication schemes using smart cards
    Phan, RCW
    [J]. COMPUTERS & SECURITY, 2006, 25 (01) : 52 - 54
  • [34] A secure one-time password authentication scheme using smart cards
    Yeh, TC
    Shen, HY
    Hwang, JJ
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2002, E85B (11) : 2515 - 2518
  • [35] Cryptanalysis of timestamp-based password authentication schemes using smart cards
    Wang, Guilin
    Bao, Feng
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 399 - +
  • [36] An improved timestamp-based password authentication scheme using smart cards
    Pathan, Al-Sakib Khan
    Hong, Choong Seon
    [J]. 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 804 - +
  • [37] Improvement of one-time password authentication scheme using smart cards
    Lee, NY
    Chen, JC
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (09) : 3765 - 3767
  • [38] RSA based remote password authentication using smart card
    Om, Hari
    Reddy, M. Ramakrishna
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2012, 15 (2-3): : 105 - 111
  • [39] A New Remote User Authentication Scheme Using Smart Cards
    Li Huiqin
    Xu Lili
    [J]. ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2008, : 205 - 208
  • [40] An improvement of remote user authentication scheme using smart cards
    Jeon, Jun-Cheol
    Kang, Byung-Heon
    Kim, Se-Min
    Lee, Wan-Soo
    Yoo, Kee-Young
    [J]. MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2006, 4325 : 416 - +