Yet another log-in authentication using N-dimensional construction based on circle property

被引:18
作者
Wang, SJ [1 ]
机构
[1] Cent Police Univ, Dept Informat Management, Tao Yuan 333, Taiwan
关键词
authentication; security; smart-card;
D O I
10.1109/TCE.2003.1209522
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we take advantage of the circle property in n-dimensional space to construct a secure user log-in authentication in a remote network system. Due to the fact that past schemes are based on the straight-line geometric property, it is easy to find their possible points of attack and therefore their proclaimed secure system is easily cracked. We therefore propose yet another sophisticated authentication system to reinforce the robustness in secure demands.
引用
收藏
页码:337 / 341
页数:5
相关论文
共 13 条
[1]  
[Anonymous], 2001, P INT C RES SMART CA, DOI DOI 10.1007/3-540-45418-7_17
[2]   A modified remote login authentication scheme based on geometric approach [J].
Chien, HY ;
Jan, JK ;
Tseng, YM .
JOURNAL OF SYSTEMS AND SOFTWARE, 2001, 55 (03) :287-290
[3]   USER AUTHENTICATION SCHEME NOT REQUIRING SECRECY IN COMPUTER [J].
EVANS, A ;
KANTROWITZ, W ;
WEISS, E .
COMMUNICATIONS OF THE ACM, 1974, 17 (08) :437-442
[4]   A new remote user authentication scheme using smart cards [J].
Hwang, MS ;
Li, LH .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (01) :28-30
[5]   CRYPTOGRAPHIC AUTHENTICATION OF TIME-INVARIANT QUANTITIES [J].
LENNON, RE ;
MATYAS, SM ;
MEYER, CH .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1981, 29 (06) :773-777
[6]  
Luby M., 1989, Journal of Cryptology, V1, P151, DOI 10.1007/BF02252873
[7]  
Menkus B., 1988, COMPUT SECUR, V7, P132, DOI [10.1016/0167-4048(88)90325-2, DOI 10.1016/0167-4048(88)90325-2]
[8]  
Rosen K. H., 1992, Elementary Number Theory and its Applications, V6th
[9]  
Stirland M., 1998, INFORMATION SECURITY, V3, P41
[10]  
Wang SJ, 1996, COMPUT SECUR, V15, P231, DOI 10.1016/0167-4048(96)00005-3