A novel remote user authentication scheme using bilinear pairings

作者: Manik Lal Das , Ashutosh Saxena , Ved P. Gulati , Deepak B. Phatak

DOI: 10.1016/J.COSE.2005.09.002

关键词: Bilinear interpolationComputer networkTimestampComputer securityLoginScheme (programming language)AuthenticationPasswordComputer scienceUser interfaceSmart card

摘要: The paper presents a remote user authentication scheme using the properties of bilinear pairings. In scheme, system receives login request and allows to if is valid. prohibits scenario many logged in users with same login-ID, provides flexible password change option registered without any assistance from system.

参考文章(20)
Akihiro Shimizu, Tsutomu Horioka, Hirohito Inagaki, A Password Authentication Method for Contents Communications on the Internet IEICE Transactions on Communications. ,vol. 81, pp. 1666- 1673 ,(1998)
Bin‐Tsan Hsieh, Hung‐Min Sun, Tzonelih Hwang, On the Security of Some Password Authentication Protocols Informatica (lithuanian Academy of Sciences). ,vol. 14, pp. 195- 204 ,(2003) , 10.15388/INFORMATICA.2003.014
Tzu-Chang Yeh, Jing-Jang Hwang, Improvement on Peyravian-Zunic's Password Authentication Schemes IEICE Transactions on Communications. ,vol. 85, pp. 823- 825 ,(2002)
Adi Shamir, Identity-based cryptosystems and signature schemes international cryptology conference. ,vol. 196, pp. 47- 53 ,(1985) , 10.1007/3-540-39568-7_5
Paulo SLM Barreto, Hae Y Kim, Ben Lynn, Michael Scott, None, Efficient Algorithms for Pairing-Based Cryptosystems Advances in Cryptology — CRYPTO 2002. pp. 354- 369 ,(2002) , 10.1007/3-540-45708-9_23
Alfred J Menezes, Paul C van Oorschot, Scott A Vanstone, Handbook of Applied Cryptography ,(1996)
Clifford Cocks, An Identity Based Encryption Scheme Based on Quadratic Residues Lecture Notes in Computer Science. pp. 360- 363 ,(2001) , 10.1007/3-540-45325-3_32
Mohammad Peyravian, Nevenko Zunic, Methods for Protecting Password Transmission Computers & Security. ,vol. 19, pp. 466- 469 ,(2000) , 10.1016/S0167-4048(00)05032-X
Wei-Chi Ku, Chien-Ming Chen, Hui-Lung Lee, Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme Operating Systems Review. ,vol. 37, pp. 19- 25 ,(2003) , 10.1145/958965.958967
Wei-Chi Ku, A hash-based strong-password authentication scheme without using smart cards Operating Systems Review. ,vol. 38, pp. 29- 34 ,(2004) , 10.1145/974104.974107