A REMOTE PASSWORD AUTHENTICATION SCHEME BASED UPON ELGAMALS SIGNATURE SCHEME

被引:32
|
作者
CHANG, CC
LIAO, WY
机构
[1] Institute of Computer Science and Information Engineering, National Chung Cheng University, Chiayi
关键词
PASSWORD AUTHENTICATION; CHINESE REMAINDER THEOREM (CRT); DIGITAL SIGNATURE; DISCRETE LOGARITHMS; ONE-WAY FUNCTION; TIMESTAMP; SMART CARDS;
D O I
10.1016/0167-4048(94)90063-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A conventional password authentication scheme requires password files or verification tables which cannot withstand an attack of replying previously intercepted passwords by an intruder. In this paper, we propose a new password authentication scheme which is based on ElGamal's signature scheme. This scheme is suitable for applications which make use of passwords that are sent from remote locations. Our scheme can verify remote passwords using neither password files nor verification tables. Our password authentication scheme has three phases: (1) the computer system issues a smart card and a password according to the ID submitted by the registering user; (2) the login procedure is invoked; and (3) the password authentication procedure is invoked. We have also analyzed the security of this newly proposed remote password authentication scheme.
引用
收藏
页码:137 / 144
页数:8
相关论文
共 50 条
  • [21] A PASSWORD AUTHENTICATION SCHEME BASED ON DISCRETE LOGARITHMS
    WU, TC
    CHANG, CC
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 1991, 41 (1-2) : 31 - 38
  • [22] Timestamp-based Password Authentication Scheme
    Ismail, E. S.
    Syed-Musa, S. M. S.
    PROCEEDING OF THE 25TH NATIONAL SYMPOSIUM ON MATHEMATICAL SCIENCES (SKSM25): MATHEMATICAL SCIENCES AS THE CORE OF INTELLECTUAL EXCELLENCE, 2018, 1974
  • [23] User authentication scheme based on undeniable signature scheme
    Jisuanji Gongcheng/Computer Engineering, 2000, 26 (08): : 146 - 147
  • [24] A password authentication scheme with secure password updating
    Lin, CL
    Hwang, T
    COMPUTERS & SECURITY, 2003, 22 (01) : 68 - 72
  • [25] Directed one-time password authentication scheme based upon discrete logarithm
    Tang, SH
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2000, 10 (3-4) : 173 - 179
  • [26] Cryptanalysis of 'A Robust Smart-Card-Based Remote User Password Authentication Scheme'A
    Kumari, Saru
    Bin Muhaya, Fahad
    Khan, Muhammad Khurram
    Kumar, Rahul
    2013 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2013, : 247 - 250
  • [27] A New Remote User Authentication Scheme based on Graphical Password using Smart Card
    Baruah, Khanjan Ch.
    Banerjee, Subhasish
    Dutta, Manash P.
    Bhunia, Chandan T.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (12): : 251 - 258
  • [28] A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS
    Chen, Bae-Ling
    Kuo, Wen-Chung
    Wuu, Lih-Chyau
    INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (01): : 53 - 59
  • [29] Notes on "A Password-Based Remote User Authentication Scheme without Smart Card"
    Kumari, Saru
    Li, Xiong
    Khan, Muhammad Khurram
    Kumar, Rahul
    2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 116 - 119
  • [30] Design and analysis of an improved smartcard-based remote user password authentication scheme
    Islam, S. K. Hafizul
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (11) : 1708 - 1719