A REMOTE PASSWORD AUTHENTICATION SCHEME BASED UPON ELGAMALS SIGNATURE SCHEME

被引:32
作者
CHANG, CC
LIAO, WY
机构
[1] Institute of Computer Science and Information Engineering, National Chung Cheng University, Chiayi
关键词
PASSWORD AUTHENTICATION; CHINESE REMAINDER THEOREM (CRT); DIGITAL SIGNATURE; DISCRETE LOGARITHMS; ONE-WAY FUNCTION; TIMESTAMP; SMART CARDS;
D O I
10.1016/0167-4048(94)90063-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A conventional password authentication scheme requires password files or verification tables which cannot withstand an attack of replying previously intercepted passwords by an intruder. In this paper, we propose a new password authentication scheme which is based on ElGamal's signature scheme. This scheme is suitable for applications which make use of passwords that are sent from remote locations. Our scheme can verify remote passwords using neither password files nor verification tables. Our password authentication scheme has three phases: (1) the computer system issues a smart card and a password according to the ID submitted by the registering user; (2) the login procedure is invoked; and (3) the password authentication procedure is invoked. We have also analyzed the security of this newly proposed remote password authentication scheme.
引用
收藏
页码:137 / 144
页数:8
相关论文
共 10 条
[1]   THE STUDY OF AN ORDERED MINIMAL PERFECT HASHING SCHEME [J].
CHANG, CC .
COMMUNICATIONS OF THE ACM, 1984, 27 (04) :384-387
[2]   REMOTE PASSWORD AUTHENTICATION WITH SMART CARDS [J].
CHANG, CC ;
WU, TC .
IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1991, 138 (03) :165-168
[3]  
CHANG CC, 1992, IEE P E, P372
[4]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[5]   USER AUTHENTICATION SCHEME NOT REQUIRING SECRECY IN COMPUTER [J].
EVANS, A ;
KANTROWITZ, W ;
WEISS, E .
COMMUNICATIONS OF THE ACM, 1974, 17 (08) :437-442
[6]  
HWANG TY, 1983, OCT P INT CARN C SEC, P35
[7]   PASSWORD AUTHENTICATION WITH INSECURE COMMUNICATION [J].
LAMPORT, L .
COMMUNICATIONS OF THE ACM, 1981, 24 (11) :770-772
[8]   CRYPTOGRAPHIC AUTHENTICATION OF TIME-INVARIANT QUANTITIES [J].
LENNON, RE ;
MATYAS, SM ;
MEYER, CH .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1981, 29 (06) :773-777
[9]   IDENTITY-BASED INFORMATION SECURITY MANAGEMENT-SYSTEM FOR PERSONAL-COMPUTER NETWORKS [J].
OKAMOTO, E ;
TANAKA, K .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1989, 7 (02) :290-294
[10]  
Singh K., 1985, Operating Systems Review, V19, P53, DOI 10.1145/1041490.1041496