Efficient password authentication schemes based on a geometric approach for a multi-server environment

2010 ◽  
Vol 11 (12) ◽  
pp. 989-997
Author(s):  
Horng-Twu Liaw ◽  
Chih-Ta Yen ◽  
Meng-Yu Chiu ◽  
Li-Lin Hsiao
2010 ◽  
Vol 143-144 ◽  
pp. 915-919
Author(s):  
Yung Cheng Lee

The well-known password authentication mechanisms are widely used in networks to protect resources from unauthorized access. The ad hoc networks, due to their dynamic and lack of network infrastructure features, require authentication schemes to ensure security. In this paper, we propose a new threshold password authentication scheme for ad hoc networks. Our scheme can be efficiently implemented in mobile devices, and can achieve mutual authentication with registered users.


2004 ◽  
Vol 27 (1) ◽  
pp. 39-51 ◽  
Author(s):  
Woei-Jiunn Tsaur ◽  
Chia-Chun Wu ◽  
Wei-Bin Lee

Cryptologia ◽  
2009 ◽  
Vol 33 (2) ◽  
pp. 183-187 ◽  
Author(s):  
Jiqiang Liu ◽  
Sheng Zhong

2010 ◽  
Vol 108-111 ◽  
pp. 1503-1508
Author(s):  
Li Hua Zhang ◽  
Li Ping Zhang ◽  
Er Fei Bai

Recently, several one time password authentication schemes have been proposed. However, most one-time password authentication schemes have security flaws. In this paper, a novel one-time password authentication and key agreement scheme (EAKAS) based on elliptic curve digital signature chain is developed. The proposed scheme has the following merits password or verification table is not required in the server; users can choose or change password; it can resist off-line dictionary attacks and achieves mutual authentication; it has no system clock synchronization and no constraint of transmission delay; it can resist replay attacks, man-in-the-middle attack and insider attack; it is sensitive to password error and strong in security restoration; the session keys in proposed scheme have the feature of freshness, confidentiality, known key security and forward security. Compared with the related schemes, our proposed scheme has better security and well suited to scenarios requiring a high level security.


Sign in / Sign up

Export Citation Format

Share Document