A Stroke-based Textual Password Authentication Scheme

被引:14
|
作者
Zheng, Ziran [1 ]
Liu, Xiyu [1 ]
Yin, Lizi [2 ]
Liu, Zhaocheng [3 ]
机构
[1] Shandong Normal Univ, Sch Management & Econ, Jinan, Peoples R China
[2] Univ Jinan, Sch Sci, Jinan, Peoples R China
[3] Jinan Railway Polytech, Dept Management, Jinan, Peoples R China
关键词
graphical password; textual password; shouder-surfing; authentication scheme;
D O I
10.1109/ETCS.2009.544
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Textual-based password authentication scheme tend to more vulnerable to attacks such as shoulder-surfing and hidden camera. To overcome the vulnerabilities of traditional methods, visual or graphical password schemes have been developed as possible alternative solutions to text-based scheme. Because simply adopting graphical password authentication also has some drawbacks, some hybrid schemes based on graphic and text were developed. In this paper, we proposed a stroke-based textual password authentication scheme. It uses shapes of strokes on the grid as the origin passwords and allows users to login with text passwords via traditional input devices. The method provides strong resistant to hidden-camera and shoulder-surfing. Moreover, the scheme has flexible enhancements to secure the authentication process. The analysis of the security of this approach is also discussed.
引用
收藏
页码:90 / +
页数:2
相关论文
共 50 条
  • [21] Password Authentication Scheme based on the Quadratic Residue Problem
    Ali, Muhammad Helmi
    Ismail, Eddie Shahril
    4TH INTERNATIONAL CONFERENCE ON MATHEMATICAL SCIENCES (ICMS4): MATHEMATICAL SCIENCES: CHAMPIONING THE WAY IN A PROBLEM BASED AND DATA DRIVEN SOCIETY, 2017, 1830
  • [22] Smart card based secure password authentication scheme
    Wang, SJ
    Chang, JF
    COMPUTERS & SECURITY, 1996, 15 (03) : 231 - 237
  • [23] An Identity Authentication Scheme based on Dynamic Password Technology
    Jia Shizhun
    Lin Jun
    Feng Xiaorong
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 166 - 171
  • [24] A REMOTE PASSWORD AUTHENTICATION SCHEME BASED UPON ELGAMALS SIGNATURE SCHEME
    CHANG, CC
    LIAO, WY
    COMPUTERS & SECURITY, 1994, 13 (02) : 137 - 144
  • [25] Cryptanalysis of a remote password authentication scheme
    Chan, CK
    Cheng, LM
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2001, 78 (03) : 323 - 326
  • [26] Simple remote password authentication scheme
    Shi, Ronghua
    Hu, Xiangling
    Jisuanji Gongcheng/Computer Engineering, 24 (09): : 43 - 44
  • [27] Hardening the Virtual Password Authentication Scheme
    Rahiemy, Mohammad Zakie Faiz
    Sukarno, Parman
    Jadied, Erwid Musthofa
    2018 6TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2018, : 429 - 434
  • [28] Remote scheme for password authentication based on theory of quadratic residues
    Chang, CC
    Tsu, SM
    Chen, CY
    COMPUTER COMMUNICATIONS, 1995, 18 (12) : 936 - 942
  • [29] A New Threshold Password Authentication Scheme
    Lee, Yung-Cheng
    SMART MATERIALS AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2011, 143-144 : 915 - 919
  • [30] Cryptanalysis of an Efficient Password Authentication Scheme
    Pan, Chiu-Shu
    Tsai, Cheng-Yi
    Tsaur, Shyh-Chang
    Hwang, Min-Shiang
    2016 3RD INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2016, : 743 - 748