A Novel Authentication Scheme Using Polynomial for Multi-server Environments

Part of the Advances in Intelligent and Soft Computing book series (AINSC, volume 133)

Abstract

Traditional remote password authentication schemes allow a user submits his/her identity and its corresponding password. Then, through a specific algorithm, the server authenticates its users alone. Due to these schemes are independent and each scheme develop a specific algorithm by their self, the development cost and time cost are very high. To avoid the costs rise, we present a novel authentication scheme using a polynomial for multi-server environments. The scheme can generate a public polynomial that contains a specific Access Right (AR). The AR means the legal user has different authorized level based on which server in the multi-server environment. Furthermore, the scheme can verify without password table. The environment can authorize many servers at one time so that the users who have registered with various servers do not need to remember different login passwords for each. For changing password, the scheme allows users to choose their passwords freely and update it off-line.

Keywords

Information Retrieval Password Authentication Hash function Security 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24, 770–772 (1981)CrossRefGoogle Scholar
  2. 2.
    ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31(4), 469–472 (1985)MathSciNetMATHCrossRefGoogle Scholar
  3. 3.
    Hwang, M.S., Lee, C.C., Tang, Y.L.: A simple remote user authentication scheme. Mathematical and Computer Modelling 36, 103–107 (2002)MathSciNetMATHCrossRefGoogle Scholar
  4. 4.
    Juang, W.S.: Efficient password authenticated key agreement using smart cards. Computers & Security 23(2), 167–173 (2004)CrossRefGoogle Scholar
  5. 5.
    Ku, W.C., Chen, C.M., Lee, H.L.: Weaknesses of Lee-Li-Hwang’s hash-based password authentication scheme. ACM Operating Systems Review 37(4), 19–25 (2003)CrossRefGoogle Scholar
  6. 6.
    Lee, C.C., Li, L.H., Hwang, M.S.: A remote user authentication scheme using hashing functions. ACM Operating Systems Review 36(4), 23–29 (2002)CrossRefGoogle Scholar
  7. 7.
    Lennon, R.E., Matyas, S.M., Mayer, C.H.: Cryptographic authentication of time-invariant quantities. IEEE Transactions on Communications 29(6), 773–777 (1981)CrossRefGoogle Scholar
  8. 8.
    Sun, H.M.: An efficient remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 46(4), 958–961 (2000)CrossRefGoogle Scholar
  9. 9.
    Sun, H.M.: Cryptanalysis of password authentication schemes with smart cards. In: Information Security Conference 2001, pp. 221–223 (2001)Google Scholar
  10. 10.
    Wang, S.J., Chang, J.F.: Smart card based secure password authentication scheme. Computers and Security 15(3), 231–237 (1996)MathSciNetCrossRefGoogle Scholar
  11. 11.
    Yang, W.H., Shieh, S.P.: Password authentication schemes with smart cards. Computers and Security 18(8), 727–733 (1999)CrossRefGoogle Scholar
  12. 12.
    Liaw, H.T., Lin, J.F., Wu, W.C.: An efficient and complete remote user authentication scheme using smart cards. Mathematical and Computer Modelling 44, 223–228 (2006)MathSciNetMATHCrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.Department of Information ManagementNational Central UniversityJhongli CityTaiwan
  2. 2.Computer CenterHsin Sheng College of Medical Care and ManagementLungtan TownshipTaiwan

Personalised recommendations