80
Views
32
CrossRef citations to date
0
Altmetric
Original Articles

A remote password authentication scheme based on the digital signature method

Pages 657-666 | Received 30 Sep 1997, Published online: 19 Mar 2007

References

  • Akl , S.G. and Taylor , P.D. 1983 . Cryptographic solution to a problem of access control in a hierarchy . ACM Transactions on Computer Systems , 1 : 239 – 248 .
  • Bauer , R.K. , Berson , T.A. and Feiertag , R.J. 1983 . A key distribution protocol using event markers . ACM Transactions on Computer Systems , 1 : 249 – 255 .
  • Chang , C.C. and Wu , T.C. . Remote password authentication with smart cards . IEE Proceedings-E . Vol. 138 , pp. 165 – 168 .
  • Chang , C.C. and Lain , C.S. . Remote password authentication with smart cards (correspondence) . IEE Proceedings-E . Vol. 139 , pp. 372
  • Denning , D.E.R. 1982 . Cryptography and Data Security , Massachusetts : Addison-Wesley .
  • Diffie , W. and Hellman , M. 1976 . New directions in cryptography . IEEE Transactions on Information Theory , 22 : 644 – 654 .
  • Elgamal , T. 1985 . A public-key cryptosystem and a signature scheme based on discrete logarithms . IEEE Transactions on Information Theory , 31 : 469 – 472 .
  • Evans , A. Jr , Kantrowitz , W. and Weiss , E. 1974 . A user authentication scheme not requiring secrecy in the computer . Communications of the ACM , 17 : 437 – 442 .
  • Fiat , A. and Shamir , A. 1986 . How to prove yourself: practical solutions to identification and signature problems . Advances in Cryptology , 17 : 186 – 194 . CRYPTO′86
  • Goldwasser , S. , Micali , S. and Rivest , R. . A paradoxical solution to the signature problem . Proc. 25th Ann. IEEE Symp . pp. 441 – 448 . FOCS
  • Gudes , E. 1980 . The design of a cryptography based secure file system . IEEE Transactions on Software Engineering , OSE-6 : 411 – 420 .
  • Herstein , I.N. 1975 . Topics in Algebra , Massachusetts : Xerox College .
  • Hwang , T.Y. . Passwords authentication using public-key encryption . IEEE Proceedings International Carnahan Conference Security Technology . pp. 141 – 144 .
  • Hwang , T. , Chen , Y. and Laih , C.S. . Non-interactive password authentications without password tables . IEEE Region 10th Conference on Computer and Communication Systems . pp. 429 – 431 .
  • Ingemarsson , I. and Wong , C.K. 1981 . A user authentication scheme for shared data based on trap-door one-way functions . Information Processing Letters , 12 : 63 – 67 .
  • Lamport , L. 1981 . Password authentication with insecure communication . Communications of the ACM , 24 : 770 – 772 .
  • Merkle , R.C. 1990 . One-way hash functions and DBS . Advances in Cryptology , 89 : 428 – 446 .
  • Merkle , R.C. 1989 . A digital signature based on a conventional encryption function . Advances in Cryptology , 89 : 218 – 238 .
  • Morris , R. 1979 . Password security: a case history . Communications of the ACM , 22 : 594 – 597 .
  • Naor , M. and Yung , M. . Universal one-way hash functions and their cryptographic applications . Proc. of the 21st STOC . pp. 33 – 43 .
  • Needham , R.M. and Schroeder , M.D. 1978 . Using encryption for authentication in large networks of computers . Communications of the ACM , 21 : 993 – 999 .
  • Neumann , P.G. 1994 . Risks of passwords . Communications of the ACM , 37 : 126
  • Reid , M.A. and Madan , M.S. 1989 . Security issues in the use of smart cards . Computer Communications , 12 : 25 – 30 .
  • Rompel , J. . One-way functions are necessary and sufficient for secure signatures . Proc. of the 22nd STOC . pp. 387 – 394 .
  • Rivest , R.L. , Shamir , A. and Adleman , L. 1978 . A method for obtaining digital signatures and public key cryptosystems . Communications of the ACM , 21 : 120 – 126 .
  • Sandhu , R.S. 1988 . Cryptographic implementation of a tree hierarchy for access control . Information Processing Letters , 27 : 95 – 98 .
  • Shamir , A. 1984 . Identity based cryptosystems & signature schemes . Advances in Cryptology , 84 : 47 – 53 .
  • Singh , K. 1985 . On improvements to password security . Operating System Review , 19 : 53 – 60 .
  • Sternglass , D. 1992 . The future is in the PC cards . IEEE Spectrum , 29 : 46 – 50 .
  • Weiss , K.P. 1986 . When a password is not a password . IEEE Comuter , 29 : 100 – 108 .
  • Wilkes , M.V. 1975 . Time Sharing Computer Systems Macdonald
  • Wood , L. 1991 . Smardcards: smarter than passwords . Datamation , 37 : 69 – 70 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.