Please wait a minute...
Front. Inform. Technol. Electron. Eng.  2010, Vol. 11 Issue (12): 989-997    DOI: 10.1631/jzus.C0910712
    
Efficient password authentication schemes based on a geometric approach for a multi-server environment
Horng-Twu Liaw, Chih-Ta Yen, Meng-Yu Chiu, Li-Lin Hsiao
Department of Information Management, Shih Hsin University, Taiwan 116, Taipei, Department of Information Management, National Taiwan University of Science and Technology, Taiwan 106, Taipei
Efficient password authentication schemes based on a geometric approach for a multi-server environment
Horng-Twu Liaw, Chih-Ta Yen, Meng-Yu Chiu, Li-Lin Hsiao
Department of Information Management, Shih Hsin University, Taiwan 116, Taipei, Department of Information Management, National Taiwan University of Science and Technology, Taiwan 106, Taipei
 全文: PDF 
摘要: Password authentication schemes based on a geometric approach are proposed. Based on geometrics such as a plane or space, the proposed schemes can be used to fulfill the various requirements for security and achieve more efficient results. They allow a user to register with many servers once without remembering different passwords for each, and also allow a user to change the password freely and update it offline. In addition, the proposed schemes do not need to maintain a verification table and are also computationally efficient. Moreover, we propose a specific access right (AR) to verify the legitimate user who has different authorization levels on a server in a multi-server environment.
关键词: AuthenticationAccess rightSecurityGeometry    
Abstract: Password authentication schemes based on a geometric approach are proposed. Based on geometrics such as a plane or space, the proposed schemes can be used to fulfill the various requirements for security and achieve more efficient results. They allow a user to register with many servers once without remembering different passwords for each, and also allow a user to change the password freely and update it offline. In addition, the proposed schemes do not need to maintain a verification table and are also computationally efficient. Moreover, we propose a specific access right (AR) to verify the legitimate user who has different authorization levels on a server in a multi-server environment.
Key words: Authentication    Access right    Security    Geometry
收稿日期: 2009-11-17 出版日期: 2010-12-09
CLC:  TP309  
服务  
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章  
Horng-Twu Liaw
Chih-Ta Yen
Meng-Yu Chiu
Li-Lin Hsiao

引用本文:

Horng-Twu Liaw, Chih-Ta Yen, Meng-Yu Chiu, Li-Lin Hsiao. Efficient password authentication schemes based on a geometric approach for a multi-server environment. Front. Inform. Technol. Electron. Eng., 2010, 11(12): 989-997.

链接本文:

http://www.zjujournals.com/xueshu/fitee/CN/10.1631/jzus.C0910712        http://www.zjujournals.com/xueshu/fitee/CN/Y2010/V11/I12/989

[1] Hui-fang YU , Bo YANG. Low-computation certificateless hybrid signcryption scheme[J]. Front. Inform. Technol. Electron. Eng., 2017, 18(7): 928-940.
[2] Zhen-hua YUAN , Chen CHEN, Xiang CHENG , Guo-cheng LV, Liu-qing YANG , Ye JIN. Correlated channel model-based secure communications in dual-hop wireless communication networks[J]. Front. Inform. Technol. Electron. Eng., 2017, 18(6): 796-807.
[3] He-hao NIU, Bang-ning ZHANG, Dao-xing GUO, Yu-zhen HUANG, Ming-yue LU. Joint cooperative beamforming and artificial noise design for secure AF relay networks with energy-harvesting eavesdroppers[J]. Front. Inform. Technol. Electron. Eng., 2017, 18(6): 850-862.
[4] Yue-bin LUO, Bao-sheng WANG, Xiao-feng WANG, Bo-feng ZHANG. A keyed-hashing based self-synchronization mechanism for port address hopping communication[J]. Front. Inform. Technol. Electron. Eng., 2017, 18(5): 719-728.
[5] Yun Niu, Li-ji Wu, Yang Liu, Xiang-min Zhang, Hong-yi Chen. A 10 Gbps in-line network security processor based on configurable hetero-multi-cores[J]. Front. Inform. Technol. Electron. Eng., 2013, 14(8): 642-651.
[6] Chih-ho Chou, Kuo-yu Tsai, Tzong-chen Wu, Kuo-hui Yeh. Efficient and secure three-party authenticated key exchange protocol for mobile environments[J]. Front. Inform. Technol. Electron. Eng., 2013, 14(5): 347-355.
[7] Kuo-Hui Yeh, Kuo-Yu Tsai, Jia-Li Hou. Analysis and design of a smart card based authentication protocol[J]. Front. Inform. Technol. Electron. Eng., 2013, 14(12): 909-917.
[8] Baiying Lei, Ing Yann Soon. A multipurpose audio watermarking algorithm with synchronization and encryption[J]. Front. Inform. Technol. Electron. Eng., 2012, 13(1): 11-19.
[9] Yi-xiong Zhang, Jiang-hong Shi, Wei-dong Wang. Video coding using geometry based block partitioning and reordering discrete cosine transform[J]. Front. Inform. Technol. Electron. Eng., 2012, 13(1): 71-82.
[10] Rong FAN, Dao-jing HE, Xue-zeng PAN, Ling-di PING. An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks[J]. Front. Inform. Technol. Electron. Eng., 2011, 12(7): 550-560.
[11] Chung-Fu Lu, Tzong-Chen Wu, Chien-Lung Hsu. A three-level authenticated conference key establishment protocol for UMTS networks[J]. Front. Inform. Technol. Electron. Eng., 2011, 12(5): 371-378.
[12] Zhi-xun Su, Zhi-yang Li, Yuan-di Zhao, Jun-jie Cao. Curvature-aware simplification for point-sampled geometry[J]. Front. Inform. Technol. Electron. Eng., 2011, 12(3): 184-194.
[13] Yang Yang, Yu-pu Hu, Le-you Zhang, Chun-hui Sun. CCA2 secure biometric identity based encryption with constant-size ciphertext[J]. Front. Inform. Technol. Electron. Eng., 2011, 12(10): 819-827.
[14] Jie Shi, Hong Zhu. A fine-grained access control model for relational databases[J]. Front. Inform. Technol. Electron. Eng., 2010, 11(8): 575-586.
[15] Chao Huang, Jian-ling Sun, Xin-yu Wang, Yuan-jie Si. Minimal role mining method for Web service composition[J]. Front. Inform. Technol. Electron. Eng., 2010, 11(5): 328-339.