Non-interactive password authentications without password tables

Tzone-Lih Hwang, Yihwa Chen, Chi Sung Laih

Research output: Chapter in Book/Report/Conference proceedingConference contribution

102 Citations (Scopus)

Abstract

The authors propose a noninteractive password authentication scheme. The scheme simply discards the use of verification tables. The legitimacy of the login user can be validated easily by anyone inside the system. However, no one can masquerade as a legitimate user even though he intecepts the previous login password. The security of the scheme is equivalent to that of Shamir's signature scheme. It can withstand the attack of replaying a previously intercepted login request.

Original languageEnglish
Title of host publication90 IEEE Reg 10 Conf Comput Commun Syst IEEE TENCON 91
PublisherPubl by IEEE
Pages429-431
Number of pages3
ISBN (Print)0879425563
Publication statusPublished - 1991 Jan 1
Event1990 IEEE Region 10 Conference on Computer and Communication Systems - IEEE TENCON '90 - Hong Kong
Duration: 1990 Sep 241990 Sep 27

Publication series

Name90 IEEE Reg 10 Conf Comput Commun Syst IEEE TENCON 91

Other

Other1990 IEEE Region 10 Conference on Computer and Communication Systems - IEEE TENCON '90
CityHong Kong
Period90-09-2490-09-27

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Fingerprint Dive into the research topics of 'Non-interactive password authentications without password tables'. Together they form a unique fingerprint.

Cite this