A remote password authentication scheme based on the digital signature method
- 1 January 1999
- journal article
- research article
- Published by Taylor & Francis in International Journal of Computer Mathematics
- Vol. 70 (4), 657-666
- https://doi.org/10.1080/00207169908804781
Abstract
Conventional password authentication schemes require password files or verification tables to validate the legitimacy of the login user. In addition, for remote access, these schemes cannot withstand an attack by replaying a previously intercepted login request. In this paper, we propose a remote password authentication scheme based on the digital signature methods. This scheme does not require the system to maintain a password file, and it can withstand attacks based on message replaying.Keywords
This publication has 22 references indexed in Scilit:
- Non-interactive password authentications without password tablesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Remote password authentication with smart cardsIEE Proceedings E Computers and Digital Techniques, 1992
- Remote password authentication with smart cardsIEE Proceedings E Computers and Digital Techniques, 1991
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- A "Paradoxical" Solution To The Signature ProblemPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1984
- Cryptographic solution to a problem of access control in a hierarchyACM Transactions on Computer Systems, 1983
- A key distribution protocol using event markersACM Transactions on Computer Systems, 1983
- The Design of a Cryptography Based Secure File SystemIEEE Transactions on Software Engineering, 1980
- New directions in cryptographyIEEE Transactions on Information Theory, 1976
- A user authentication scheme not requiring secrecy in the computerCommunications of the ACM, 1974