메뉴 건너뛰기




Volumn 42, Issue 1, 1998, Pages 45-57

"Paramita wisdom" password authentication scheme without verification tables

Author keywords

Cryptography; Password authentication

Indexed keywords

CODES (SYMBOLS); DATA HANDLING; ENCODING (SYMBOLS); SECURITY OF DATA; SYSTEMS ANALYSIS;

EID: 0002063278     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0164-1212(98)00006-5     Document Type: Article
Times cited : (54)

References (65)
  • 6
    • 85034644807 scopus 로고
    • Efficient zero-knowledge identification schemes for smart cards
    • Springer, Berlin
    • Beth, T., 1989. Efficient zero-knowledge identification schemes for smart cards. In: Advances in Cryptology - Proceedings of EUROCRYPT'88. Springer, Berlin, pp. 77-84.
    • (1989) Advances in Cryptology - Proceedings of EUROCRYPT'88 , pp. 77-84
    • Beth, T.1
  • 7
    • 85030309636 scopus 로고
    • Identification tokens - Or: Solving the chess grandmaster problem
    • Springer, Berlin
    • Beth, T., Desmedt, Y.G., 1991. Identification tokens - or: Solving the chess grandmaster problem. In: Advances in Cryptology -Proceedings of CRYPTO'90. Springer, Berlin, pp. 169-178.
    • (1991) Advances in Cryptology -Proceedings of CRYPTO'90 , pp. 169-178
    • Beth, T.1    Desmedt, Y.G.2
  • 9
    • 0026627555 scopus 로고
    • A interactive identification scheme based on discrete logarithms and factoring
    • Brickell, E.F., McCurley, K.S., 1992. A interactive identification scheme based on discrete logarithms and factoring. J. Cryptol. 5, 29-39.
    • (1992) J. Cryptol. , vol.5 , pp. 29-39
    • Brickell, E.F.1    McCurley, K.S.2
  • 10
    • 0347856046 scopus 로고
    • Efficient zero-knowledge identification schemes for smart cards
    • Burmester, B., Desmedt, Y., Beth, T., 1992. Efficient zero-knowledge identification schemes for smart cards. Comput. J. 35 (1), 21-29.
    • (1992) Comput. J. , vol.35 , Issue.1 , pp. 21-29
    • Burmester, B.1    Desmedt, Y.2    Beth, T.3
  • 12
    • 0347856044 scopus 로고
    • Sharing a polynomial for password authentication
    • Chang, C.C., Liaw, H.T., 1989. Sharing a polynomial for password authentication. J. Comput. 1 (4), 11-17.
    • (1989) J. Comput. , vol.1 , Issue.4 , pp. 11-17
    • Chang, C.C.1    Liaw, H.T.2
  • 13
    • 0346596017 scopus 로고
    • A new password authentication scheme
    • Chang, C.C., Wu, L.H., 1990a. A new password authentication scheme. J. Inform. Sci. Eng. 6, 139-147.
    • (1990) J. Inform. Sci. Eng. , vol.6 , pp. 139-147
    • Chang, C.C.1    Wu, L.H.2
  • 15
    • 0026153410 scopus 로고
    • A remote password authentication with smart cards
    • Chang, C.C., Wu, T.C., 1991. A remote password authentication with smart cards. IEE Proc. E 138 (3), 165-168.
    • (1991) IEE Proc. E , vol.138 , Issue.3 , pp. 165-168
    • Chang, C.C.1    Wu, T.C.2
  • 16
    • 0345964588 scopus 로고
    • A password authentication scheme based upon Diffie and Hellman's public key system
    • Chiayi, Taiwan, R.O.C.
    • Chang, C.C., Hwang, S.M., 1992. A password authentication scheme based upon Diffie and Hellman's public key system. In: The Second National Conference on Information Security, Chiayi, Taiwan, R.O.C., pp. 85-104.
    • (1992) The Second National Conference on Information Security , pp. 85-104
    • Chang, C.C.1    Hwang, S.M.2
  • 17
    • 0011869977 scopus 로고
    • Correspondence for remote password authentication with smart cards
    • Chang, C.C., Laih, C.S., 1992. Correspondence for remote password authentication with smart cards. IEE Proc. E 139 (4), 372.
    • (1992) IEE Proc. E , vol.139 , Issue.4 , pp. 372
    • Chang, C.C.1    Laih, C.S.2
  • 18
    • 0001784609 scopus 로고
    • Using smart cards to authenticate remote passwords
    • Chang, C.C., Hwang, S.J., 1993. Using smart cards to authenticate remote passwords. Comput. Math. Appl. 26 (7), 19-27.
    • (1993) Comput. Math. Appl. , vol.26 , Issue.7 , pp. 19-27
    • Chang, C.C.1    Hwang, S.J.2
  • 19
    • 0028405583 scopus 로고
    • A remote password authentication scheme based upon ElGamal's signature scheme
    • Chang, C.C., Liao, W.Y., 1994. A remote password authentication scheme based upon ElGamal's signature scheme. Comput. Security 13, 137-144.
    • (1994) Comput. Security , vol.13 , pp. 137-144
    • Chang, C.C.1    Liao, W.Y.2
  • 20
    • 0347225875 scopus 로고
    • Interactive remote login authentication scheme with smart cards
    • Taipei, Taiwan, R.O.C.
    • Chang, C.C., Wu, T.C., 1994. Interactive remote login authentication scheme with smart cards. In: The Fourth National Conference on Information Security, Taipei, Taiwan, R.O.C., pp. 151-156.
    • (1994) The Fourth National Conference on Information Security , pp. 151-156
    • Chang, C.C.1    Wu, T.C.2
  • 22
    • 85023982750 scopus 로고
    • An improved protocol for demonstrating possession of discrete logarithms and some generalizations
    • Springer, Berlin
    • Chaum, D., Evertse, J.H., van de Graff, J., 1988. An improved protocol for demonstrating possession of discrete logarithms and some generalizations. In: Advances in Cryptology - Proceedings of EUROCRYPT'87. Springer, Berlin, pp. 127-141.
    • (1988) Advances in Cryptology - Proceedings of EUROCRYPT'87 , pp. 127-141
    • Chaum, D.1    Evertse, J.H.2    Van De Graff, J.3
  • 23
    • 0345964589 scopus 로고
    • FIPS Pub. 46, National Bureau of Standards, Washington, DC
    • Data Encryption Standard, 1977. FIPS Pub. 46, National Bureau of Standards, Washington, DC.
    • (1977)
  • 28
    • 0016092372 scopus 로고
    • A user authentication scheme not requiring secrecy in the computer
    • Evans, A., Jr., Kantrowitz, W., Weiss, E., 1974. A user authentication scheme not requiring secrecy in the computer. Commun. ACM 17 (8), 437-442.
    • (1974) Commun. ACM , vol.17 , Issue.8 , pp. 437-442
    • Evans A., Jr.1    Kantrowitz, W.2    Weiss, E.3
  • 29
    • 0024135240 scopus 로고
    • Zero knowledge proofs of identity
    • Feige, U., Fiat, A., Shamir, A., 1988. Zero knowledge proofs of identity. J. Cryptol. 1 (2), 77-94.
    • (1988) J. Cryptol. , vol.1 , Issue.2 , pp. 77-94
    • Feige, U.1    Fiat, A.2    Shamir, A.3
  • 30
    • 0016579870 scopus 로고
    • Some cryptography techniques for machine to machine data communications
    • Feistel, H., Notz, W.A., Smith, J.L., 1975. Some cryptography techniques for machine to machine data communications. Proc. IEEE 63 (11), 1545-1554.
    • (1975) Proc. IEEE , vol.63 , Issue.11 , pp. 1545-1554
    • Feistel, H.1    Notz, W.A.2    Smith, J.L.3
  • 31
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Springer, Berlin
    • Fiat, A., Shamir, A., 1987a. How to prove yourself: Practical solutions to identification and signature problems. In: Advances in Cryptology - Proceedings of CRYPTO'86. Springer, Berlin, pp. 186-194.
    • (1987) Advances in Cryptology - Proceedings of CRYPTO'86 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 32
  • 34
    • 84959165880 scopus 로고
    • A critical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
    • Springer, Berlin
    • Guillou, L.C., Quisquater, J.J., 1989. A critical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. In: Advances in Cryptology - Proceedings of EUROCRYPT'88. Springer, Berlin, pp. 123-128.
    • (1989) Advances in Cryptology - Proceedings of EUROCRYPT'88 , pp. 123-128
    • Guillou, L.C.1    Quisquater, J.J.2
  • 36
    • 0024903684 scopus 로고
    • Password authentication using public-key cryptography
    • Harn, L., Huand, D., Laih, C.S., 1989. Password authentication using public-key cryptography. Comput. Math. Appl. 18 (12), 1001-1017.
    • (1989) Comput. Math. Appl. , vol.18 , Issue.12 , pp. 1001-1017
    • Harn, L.1    Huand, D.2    Laih, C.S.3
  • 40
    • 0024771499 scopus 로고
    • A survey of password mechanisms: Weakness and potential improvements, Part 1
    • Jobusch, D.L., Oldhoeft, A.E., 1989a. A survey of password mechanisms: Weakness and potential improvements, Part 1. Comput. Security 8, 587-601.
    • (1989) Comput. Security , vol.8 , pp. 587-601
    • Jobusch, D.L.1    Oldhoeft, A.E.2
  • 41
    • 0024777503 scopus 로고
    • A survey of password mechanisms: Weakness and potential improvements, Part 2
    • Jobusch, D.L., Oldhoeft, A.E., 1989b. A survey of password mechanisms: Weakness and potential improvements, Part 2. Comput. Security 8, 675-689.
    • (1989) Comput. Security , vol.8 , pp. 675-689
    • Jobusch, D.L.1    Oldhoeft, A.E.2
  • 42
    • 3342960338 scopus 로고
    • Direct demonstration of the power to break public-key cryptosystems
    • Springer, Berlin
    • Koyama, K., 1991. Direct demonstration of the power to break public-key cryptosystems. In: Advances in Cryptology - Proceedings of AUSCRYPT'90. Springer, Berlin, pp. 14-21.
    • (1991) Advances in Cryptology - Proceedings of AUSCRYPT'90 , pp. 14-21
    • Koyama, K.1
  • 44
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport, L., 1981. Password authentication with insecure communication. Comm. ACM 24 (11), 770-772.
    • (1981) Comm. ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 45
    • 0019579253 scopus 로고
    • Cryptographic authentication of time-invariant quantities
    • Lennon, R.E., Matyas, S.M., Meyer, C.H., 1981. Cryptographic authentication of time-invariant quantities. IEEE Trans. Commun. COM 29 (6), 773-777.
    • (1981) IEEE Trans. Commun. COM , vol.29 , Issue.6 , pp. 773-777
    • Lennon, R.E.1    Matyas, S.M.2    Meyer, C.H.3
  • 46
    • 0345964585 scopus 로고
    • Password authentication schemes based on triangles and straight lines
    • Liaw, H.T., 1993. Password authentication schemes based on triangles and straight lines. Shin-Hsin News 3, 41-57.
    • (1993) Shin-Hsin News , vol.3 , pp. 41-57
    • Liaw, H.T.1
  • 47
    • 0037724292 scopus 로고
    • Password authentication using a unit circle encryption
    • Liaw, H.T., 1995. Password authentication using a unit circle encryption. Cryptology, XIX (2), 198-208.
    • (1995) Cryptology , vol.19 , Issue.2 , pp. 198-208
    • Liaw, H.T.1
  • 48
    • 0347225871 scopus 로고
    • Password authentication using Newton's interpolating polynomials
    • Lin, C.H., Chang, C.S., Wu, T.C., Lee, R.C.T., 1991. Password authentication using Newton's interpolating polynomials. Inform. Systems 16 (1), 97-102.
    • (1991) Inform. Systems , vol.16 , Issue.1 , pp. 97-102
    • Lin, C.H.1    Chang, C.S.2    Wu, T.C.3    Lee, R.C.T.4
  • 49
    • 85031775795 scopus 로고
    • An improvement of the Fiat-Shamir identification and signature scheme
    • Springer, Berlin
    • Micali, S., Shamir, A., 1989. An improvement of the Fiat-Shamir identification and signature scheme. In: Advances in Cryptology - Proceedings of CRYPTO'88. Springer, Berlin, pp. 244-247.
    • (1989) Advances in Cryptology - Proceedings of CRYPTO'88 , pp. 244-247
    • Micali, S.1    Shamir, A.2
  • 50
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needhan, R.M., Schroeder, M.D., 1978. Using encryption for authentication in large networks of computers. Commun. ACM 21 (12), 993-999.
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needhan, R.M.1    Schroeder, M.D.2
  • 51
    • 0024053244 scopus 로고
    • Pratical extension of Fiat-Shamir scheme
    • Ohta, K., Okamoto, T., 1988. Pratical extension of Fiat-Shamir scheme. Electron. Lett. 24 (15), 955-956.
    • (1988) Electron. Lett. , vol.24 , Issue.15 , pp. 955-956
    • Ohta, K.1    Okamoto, T.2
  • 54
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms over GF(P) and its cryptographic significance
    • Pohlig, S.C., Hellman, M.E., 1978. An improved algorithm for computing logarithms over GF(P) and its cryptographic significance. IEEE Trans. Inform. Theory IT 24 (1), 106-110.
    • (1978) IEEE Trans. Inform. Theory IT , vol.24 , Issue.1 , pp. 106-110
    • Pohlig, S.C.1    Hellman, M.E.2
  • 55
    • 0016090968 scopus 로고
    • A high security login procedure
    • Purdy, G.B., 1974. A high security login procedure. Commun. ACM 17 (8), 442-445.
    • (1974) Commun. ACM , vol.17 , Issue.8 , pp. 442-445
    • Purdy, G.B.1
  • 57
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R.L., Shamir, A., Adleman, L., 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21 (2), 120-126.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 58
    • 0000537828 scopus 로고
    • Efficient identification and signatures for smart cards
    • Springer, Berlin
    • Schnorr, C.P., 1990. Efficient identification and signatures for smart cards. In: Advances in Cryptology - Proceedings of CRYPTO'89. Springer, Berlin, pp. 239-252.
    • (1990) Advances in Cryptology - Proceedings of CRYPTO'89 , pp. 239-252
    • Schnorr, C.P.1
  • 59
    • 85020598353 scopus 로고
    • Identity based cryptosystems and signature schemes
    • Springer, Berlin
    • Shamir, A., 1985. Identity based cryptosystems and signature schemes. In: Advances in Cryptology - Proceedings of CRYPTO'84. Springer, Berlin, pp. 47-53.
    • (1985) Advances in Cryptology - Proceedings of CRYPTO'84 , pp. 47-53
    • Shamir, A.1
  • 60
    • 0025840878 scopus 로고
    • A dynamic password authentication method using a one-way function
    • Shimizu, A., 1991. A dynamic password authentication method using a one-way function. System Comput. Japan 22 (7), 32-40.
    • (1991) System Comput. Japan , vol.22 , Issue.7 , pp. 32-40
    • Shimizu, A.1
  • 61
    • 0021939027 scopus 로고
    • On improvements to password security
    • Singh, K., 1985. On improvements to password security. Oper. System Rev. 19 (1), 53-60.
    • (1985) Oper. System Rev. , vol.19 , Issue.1 , pp. 53-60
    • Singh, K.1
  • 62
    • 0040545605 scopus 로고
    • The future is in the PC cards
    • Sternaglass, D., 1992. The future is in the PC cards. IEEE Spectrum 29 (6), 46-50.
    • (1992) IEEE Spectrum , vol.29 , Issue.6 , pp. 46-50
    • Sternaglass, D.1
  • 64
    • 0347767593 scopus 로고
    • SmartCards: Smarter than passwords
    • Wood, L., 1991. SmartCards: Smarter than passwords. Datamation 37 (14), 69-70.
    • (1991) Datamation , vol.37 , Issue.14 , pp. 69-70
    • Wood, L.1
  • 65
    • 0347856037 scopus 로고
    • Noninteractive remote login authentication based on factoring and discrete logarithms
    • Taipei, Taiwan, R.O.C.
    • Wu, T.C., He, W.H., 1994. Noninteractive remote login authentication based on factoring and discrete logarithms. In: The Fourth National Conference on Information Security, Taipei, Taiwan, R.O.C., pp. 157-172.
    • (1994) The Fourth National Conference on Information Security , pp. 157-172
    • Wu, T.C.1    He, W.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.