Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《ACTA ELECTRONICA SINICA》 2000-02
Add to Favorite Get Latest Update

Remote Scheme for Password Authentication Based on Cross Product

TAN Kai jun,HE Chen,ZHU Hong wen(Department of Electronic Engineering,Shanghai Jiao Tong University,Shanghai 200030,China)  
A remote password authentication scheme based on cross product is proposed in this paper.In this scheme,any legal user can freely choose his own password in the card initialization phase.Using his password and smart card,he can then log into the remote system successfully.According to the analysis,intruders can not obtain any secret information from the public information or transmitted messages and impersonate another legal user.In addition,this scheme can withstand the attack of replaying previously intercepted log in requests.The amount of computation in this scheme are smaller than that in C H scheme.
【CateGory Index】: TP393
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 2 Hits
1 YUAN Ding,FAN Ping-zhi;Remote Dynamic Password Authentication Scheme[J];Application Research of Computers;2001-07
2 FANG Gen-Xi DAI Zong-Duo YANG Jun-Hui(SKLOIS, Graduate School of USTC, Beijing 100039 ;Institute of Software, CAS, Beijing 100080);Cryptanalysis of a Remote Password Authentication Scheme[J];Journal of the Graduate School of the Chinese Acadmy of Science;2002-03
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 ZHAO Jian~(1,2),DU Qin-sheng~(1,3),WANG Bing-bing~1 (1.School of Computer Science and Technology,Changchun University,Changchun 130022,China;2.School of Computer Science and Technology,Jilin University,Changchun 130012,China;3.School of Computer Science,Qufu Normal University,Qufu 273165,China);Basic research of block ciphers[J];Journal of Changchun University;2006-12
2 Yuan Ding1 Fan Pingzhi2 (1. Institute of Mobile Communications, Southwest Jiaotong University Chengdu 610031 ; 2. School of Computer Science , Sichuan Normal University Chengdu 610066);An Electronic Evidence and Non-Repudiation Protocol and Its Formal Analysis[J];Journal of University of Electronic Science and Technology of China;2004-05
3 Tian Janbo;Xu Shendo;Wang Yumin(National Key Lab.on ISN,Xidian University,Xi'an710071);A Modified Logic of Authentication[J];ACTA ELECTRONICA SINICA;1998-07
4 WANG Tao,MAO Zhi gang,YE Yi zheng(Microelectronics Center,Harbin Institute of Technology,Harbin 150001,China);Research on a Dedicated CPU Architecture for Java IC Card[J];ACTA ELECTRONICA SINICA;2000-11
5 LI Shu-guo,ZHOU Run-de,FENG Jian-hua,SUN Yi-he (Institute of Microelectronics,Tsinghua University,Beijing 100084,China);Implementation for RSA Cryptography Coprocessor[J];Acta Electronica Sinica;2001-11
6 ZHANG Yi-gang,JIAO Yu-hua,NIU Xia-mu,YU Long-jiang (Dept. of Automatic Test and Control,Harbin Institute of Technology,Harbin,Heilongjiang 150001,China);Authentication Based on Fingerprint Feature Watermarking Algorithm[J];Acta Electronica Sinica;2003-S1
7 YUAN Xiao-yu,ZHANG Qi-shan (School of Electronic Engineering,Beihang University,Beijing 100083,China);The Key Question Analysis of RSA Digital Signature Algorithm Based on Smart Card[J];Acta Electronica Sinica;2004-11
8 Li zhongxian Zhan Banghua Yang Yixian (Beijing University of Posts and Telecommunications,Beijing 100876);A Survey of Identification and Authentication[J];ACTA ELECTRONICA SINICA;1999-01
9 Song Ronggong Hu Zhengming Yang Yixian (Dept. of Infor. Eng., Beijing University of Posts and Telecommunications, Beijing 100876);THE INVESTIGATION OF THE FRESHNESS IN BAN LOGIC[J];;2000-03
10 Zheng Dong Wang Changjie Wang Yumin (Xidian University, Xi'an 710071);A MODIFIED BAN-LOGIC[J];;2000-04
【Secondary References】
Chinese Journal Full-text Database 4 Hits
1 ZHANG Haifeng1, ZHAO Kai1, LU Ti2 (1.Great Wall Computer Software & Systems Inc. Ltd., Beijing 100083; 2.Beijing Institute of Machinery, Beijing 100085);A Summary of Lightweight Certificate Authority[J];Computer Engineering;2003-01
2 LIN Song~1,DOU Wei-yu~2(1.Inst.of Info.Security,Sichuan Univ.,Chengdu 610064,China;2.School of Computer,Sichuan Univ.,Chengdu 610064,China);A Group Signature Scheme for Resisting Forgery Attack[J];Journal of Sichuan University(Engineering Science Edition);2006-01
3 MENG Yan-hong, LI Ya-hong, HUANG Jing (School of Information Science and Engineering, Shenyang University of Technology, Shenyang 110023, China);A simple scheme for remote dynamic password authentication[J];Journal of Shenyang University of Technology;2005-01
4 ;Study of Security Protocol Modification for Contactless Smart Card[J];Computer Systems & Applications;2009-05
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved