Remote password authentication scheme based on cross-product

被引:35
作者
Tan, K [1 ]
Zhu, H [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Elect Engn, Shanghai 200030, Peoples R China
关键词
remote password authentication; cross-product; log-in request; time stamp; smart card;
D O I
10.1016/S0140-3664(98)00215-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A remote password authentication scheme based on cross-product is proposed in this paper. In this scheme, any legal user can freely choose his own password in the card initialization phase. Using his password and smart card, he san then log into the system successfully. According to the analysis, intruders can not obtain any secret information from the public information or transmitted messages and impersonate another legal user. In addition, this scheme can withstand the attack of replaying previously intercepted log-in requests. The amount of computation in this scheme is smaller than that in Chang and Hwang's scheme [Using smart cards to authenticate remote passwords, Comp. Math. Applic. 26(7) (1993) 19-27]. (C) 1999 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:390 / 393
页数:4
相关论文
共 11 条
[1]   A REMOTE PASSWORD AUTHENTICATION SCHEME BASED UPON ELGAMALS SIGNATURE SCHEME [J].
CHANG, CC ;
LIAO, WY .
COMPUTERS & SECURITY, 1994, 13 (02) :137-144
[2]   REMOTE PASSWORD AUTHENTICATION WITH SMART CARDS [J].
CHANG, CC ;
LAIH, CS .
IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1992, 139 (04) :372-372
[3]   REMOTE PASSWORD AUTHENTICATION WITH SMART CARDS [J].
CHANG, CC ;
WU, TC .
IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1991, 138 (03) :165-168
[4]   USING SMART CARDS TO AUTHENTICATE REMOTE PASSWORDS [J].
CHANG, CC ;
HWANG, SJ .
COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1993, 26 (07) :19-27
[5]   Remote scheme for password authentication based on theory of quadratic residues [J].
Chang, CC ;
Tsu, SM ;
Chen, CY .
COMPUTER COMMUNICATIONS, 1995, 18 (12) :936-942
[6]   USER AUTHENTICATION SCHEME NOT REQUIRING SECRECY IN COMPUTER [J].
EVANS, A ;
KANTROWITZ, W ;
WEISS, E .
COMMUNICATIONS OF THE ACM, 1974, 17 (08) :437-442
[7]   SOME CRYPTOGRAPHIC TECHNIQUES FOR MACHINE-TO-MACHINE DATA COMMUNICATIONS [J].
FEISTEL, H ;
NOTZ, WA ;
SMITH, JL .
PROCEEDINGS OF THE IEEE, 1975, 63 (11) :1545-1554
[8]   CRYPTOGRAPHIC AUTHENTICATION OF TIME-INVARIANT QUANTITIES [J].
LENNON, RE ;
MATYAS, SM ;
MEYER, CH .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1981, 29 (06) :773-777
[9]   A CONFERENCE KEY DISTRIBUTION-SYSTEM BASED ON CROSS-PRODUCT [J].
WU, TC ;
YEH, YS .
COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1993, 25 (04) :39-46
[10]   Remote login authentication scheme based on a geometric approach [J].
Wu, TC .
COMPUTER COMMUNICATIONS, 1995, 18 (12) :959-963