期刊文献+

Efficient password authentication schemes based on a geometric approach for a multi-server environment

Efficient password authentication schemes based on a geometric approach for a multi-server environment
原文传递
导出
摘要 Password authentication schemes based on a geometric approach are proposed. Based on geometrics such as a plane or space, the proposed schemes can be used to fulfill the various requirements for security and achieve more efficient results. They allow a user to register with many servers once without remembering different passwords for each, and also allow a user to change the password freely and update it offline. In addition, the proposed schemes do not need to maintain a verification table and are also computationally efficient. Moreover, we propose a specific access right (AR) to verify the legitimate user who has different authorization levels on a server in a multi-server environment. Password authentication schemes based on a geometric approach are proposed. Based on geometrics such as a plane or space, the proposed schemes can be used to fulfill the various requirements for security and achieve more efficient results. They allow a user to register with many servers once without remembering different passwords for each, and also allow a user to change the password freely and update it offline. In addition, the proposed schemes do not need to maintain a verification table and are also computationally efficient. Moreover, we propose a specific access right (AR) to verify the legitimate user who has different authorization levels on a server in a multi-server environment.
出处 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2010年第12期989-997,共9页 浙江大学学报C辑(计算机与电子(英文版)
关键词 AUTHENTICATION Access right Security GEOMETRY Authentication, Access right, Security, Geometry
  • 相关文献

参考文献10

  • 1Hwang, M.S., Chong, S.K., Chen, T.Y., 2010. DoS-resistant ID-based password authentication scheme using smart cards. J. Syst. Softw., 83(1):163-172. [doi:10.1016/j.jss. 2009.07.050].
  • 2Juang, W.S., 2004. Efficient password authenticated key agreement using smart cards. Comput. & Secur., 23(2): 167-173. [doi:10.1016/j.cose.2003.11.005].
  • 3Lamport, L., 1981. Password authentication with insecure communication. Commun. ACM, 24(11):770-772. [doi:10. 1145/358790.358797].
  • 4Liao, C.H., Chen, H.C., Wang, C.T., 2009. An exquisite mutual authentication scheme with key agreement using smart eard. Informatica, 33(2): 117-124.
  • 5Liao, Y.P., Wang, S.S., 2009. A secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Stand. Interf, 31 (1):24-29. [doi: 10. 1016/j.csi.2007.10.007].
  • 6Lin, I.C., Hwang, M.S., Li, L.H., 2003. A new remote user authentication scheme for multi-server architecture. Fut. Gener. Comput. Syst., 19(1):13-22. [doi:10.1016/S0167- 739X(02)00093-6].
  • 7Rhee, H.S., Kwon, J.O., Lee, D.H., 2009. A remote user authentication scheme without using smart cards. Comput. Stand. Interf, 31(1):6-13. [doi:10.1016/j.csi.2007.11.017].
  • 8Tsai, J.L., 2008. Efficient multi-server authentication scheme based on one-way hash function without verification table. Comput. & Secur., 27(3-4):115-121. [doi:10.1016/j.cose. 2008.04.001].
  • 9Tsaur, W.J., Wu, C.C., Lee, W.B., 2005. An enhanced user authentication scheme for multi-server Intemet services. Appl. Math. Comput., 170(1):258-266. [doi:10.1016/j. amc.2004.11.033].
  • 10Yoon, E.J., Ryu, E.K.,Yoo, K.Y., 2004. Further improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron., 50(2):612-614. [doi:10.1109/TOE.2004.1309437].

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部