Password authentication schemes with smart cards

被引:252
作者
Yang, WH [1 ]
Shieh, SP [1 ]
机构
[1] Natl Chiao Tung Univ, Coll Elect Engn & CompSci, Dept Comp Sci & Informat Engn, Hsinchu 30010, Taiwan
关键词
password authentication; smart card; ID-based scheme; clock synchronization;
D O I
10.1016/S0167-4048(99)80136-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 [计算机科学与技术];
摘要
In this paper, two password authentication schemes with smart cards are proposed. In the schemes, users can change their pass-words freely, and the remote system does nor need the directory of passwords or verification tables to authenticate users. Once the secure network environment is see up, authentication can be handled solely by the two parries involved. For a network without synchronized clocks, the proposed nonce-based authentication scheme is able to prevent malicious reply attacks.
引用
收藏
页码:727 / 733
页数:7
相关论文
共 21 条
[1]
ADLEMAN LM, 1979, P 20 IEEE FDN COMP S, P55
[2]
REMOTE PASSWORD AUTHENTICATION WITH SMART CARDS [J].
CHANG, CC ;
WU, TC .
IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1991, 138 (03) :165-168
[3]
USING SMART CARDS TO AUTHENTICATE REMOTE PASSWORDS [J].
CHANG, CC ;
HWANG, SJ .
COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1993, 26 (07) :19-27
[4]
TIMESTAMPS IN KEY DISTRIBUTION PROTOCOLS [J].
DENNING, DE ;
SACCO, GM .
COMMUNICATIONS OF THE ACM, 1981, 24 (08) :533-536
[5]
A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[6]
USER AUTHENTICATION SCHEME NOT REQUIRING SECRECY IN COMPUTER [J].
EVANS, A ;
KANTROWITZ, W ;
WEISS, E .
COMMUNICATIONS OF THE ACM, 1974, 17 (08) :437-442
[7]
GONG L, 1992, ACM OPERATING SYSTEM, V26
[8]
Kehne A., 1992, Operating Systems Review, V26, P84, DOI 10.1145/142854.142872
[9]
Kohl J., 1993, 1510 RFC
[10]
CRYPTOGRAPHIC AUTHENTICATION OF TIME-INVARIANT QUANTITIES [J].
LENNON, RE ;
MATYAS, SM ;
MEYER, CH .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1981, 29 (06) :773-777