Refereed paper: Password authentication schemes with smart cards

作者: Wen-Her Yang , Shiuh-Pyng Shieh

DOI: 10.1016/S0167-4048(99)80136-9

关键词:

摘要: In this paper, two password authentication schemes with smart cards are proposed. the schemes, users can change their passwords freely, and remote system does not need directory of or verification tables to authenticate users. Once secure network environment is set up, be handled solely by parties involved. For a without synchronized clocks, proposed nonce-based scheme able prevent malicious reply attacks.

参考文章(22)
Adi Shamir, Identity-based cryptosystems and signature schemes international cryptology conference. ,vol. 196, pp. 47- 53 ,(1985) , 10.1007/3-540-39568-7_5
C. Neuman, J. Kohl, The Kerberos Network Authentication Service (V5) RFC. ,vol. 1510, pp. 1- 112 ,(1993)
R. Lennon, S. Matyas, C. Meyer, Cryptographic Authentication of Time-Invariant Quantities IEEE Transactions on Communications. ,vol. 29, pp. 773- 777 ,(1981) , 10.1109/TCOM.1981.1095067
B. Clifford Neuman, Stuart G. Stubblebine, A note on the use of timestamps as nonces ACM SIGOPS Operating Systems Review. ,vol. 27, pp. 10- 14 ,(1993) , 10.1145/155848.155852
R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM. ,vol. 26, pp. 96- 99 ,(1983) , 10.1145/357980.358017
Dorothy E. Denning, Giovanni Maria Sacco, Timestamps in key distribution protocols Communications of The ACM. ,vol. 24, pp. 533- 536 ,(1981) , 10.1145/358722.358740
C-C Chang, S-J Hwang, None, Using smart cards to authenticate remote passwords Computers & Mathematics With Applications. ,vol. 26, pp. 19- 27 ,(1993) , 10.1016/0898-1221(93)90048-Z
Paul Syverson, On key distribution protocols for repeated authentication ACM SIGOPS Operating Systems Review. ,vol. 27, pp. 24- 30 ,(1993) , 10.1145/163640.163642
A. Kehne, J. Schönwälder, H. Langendörfer, A nonce-based protocol for multiple authentications ACM SIGOPS Operating Systems Review. ,vol. 26, pp. 84- 89 ,(1992) , 10.1145/142854.142872
Li Gong, A security risk of depending on synchronized clocks Operating Systems Review. ,vol. 26, pp. 49- 53 ,(1992) , 10.1145/130704.130709