A remote password authentication scheme based upon ElGamal's signature scheme
Computers and Security
A user authentication scheme not requiring secrecy in the computer
Communications of the ACM
Research note: Group commitment protocol based on zero knowledge proofs
Computer Communications
Research: Remote login authentication scheme based on a geometric approach
Computer Communications
Research: Remote scheme for password authentication based on theory of quadratic residues
Computer Communications
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
Computer Standards & Interfaces
An efficient and secure multi-server authentication scheme with key agreement
Journal of Systems and Software
Encrypted remote user authentication scheme by using smart card
WISM'12 Proceedings of the 2012 international conference on Web Information Systems and Mining
Hi-index | 0.24 |
A remote password authentication scheme based on cross-product is proposed in this paper. In this scheme, any legal user can freely choose his own password in the card initialization phase. Using his password and smart card, he can then log into the system successfully. According to the analysis, intruders can not obtain any secret information from the public information or transmitted messages and impersonate another legal user. In addition, this scheme can withstand the attack of replaying previously intercepted log-in requests. The amount of computation in this scheme is smaller than that in Chang and Hwang's scheme [Using smart cards to authenticate remote passwords, Comp. Math. Applic. 26(7) (1993) 19-27].