An efficient probabilistic encryption scheme
Information Processing Letters
Password authentication with insecure communication
Communications of the ACM
A user authentication scheme not requiring secrecy in the computer
Communications of the ACM
Password Authentication Based On Public-Key Distribution Cryptosystem
Proceedings of the Fifth International Conference on Data Engineering
Remarks on fingerprint-based remote user authentication scheme using smart cards
ACM SIGOPS Operating Systems Review
Information Sciences: an International Journal
A novel hierarchical key management scheme based on quadratic residues
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
Research note: A conference key distribution scheme based on the theory of quadratic residues
Computer Communications
Research note: Remote password authentication scheme based on cross-product
Computer Communications
Hi-index | 0.24 |
We propose a remote password authentication scheme based on quadratic residues. In our scheme, any legal user can freely choose his own password in the card initialization phase. Using his password and smart card which contains identity and other information, he can then log into the system successfully. According to our analysis, intruders cannot obtain any secret information from the public information, or derive any password from intercepted messages. In addition, our scheme can withstand the attack of replaying previously intercepted log-in requests.