Please wait a minute...
Front. Inform. Technol. Electron. Eng.  2010, Vol. 11 Issue (12): 989-997    DOI: 10.1631/jzus.C0910712
    
Efficient password authentication schemes based on a geometric approach for a multi-server environment
Horng-Twu Liaw, Chih-Ta Yen, Meng-Yu Chiu, Li-Lin Hsiao
Department of Information Management, Shih Hsin University, Taiwan 116, Taipei, Department of Information Management, National Taiwan University of Science and Technology, Taiwan 106, Taipei
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      

Abstract  Password authentication schemes based on a geometric approach are proposed. Based on geometrics such as a plane or space, the proposed schemes can be used to fulfill the various requirements for security and achieve more efficient results. They allow a user to register with many servers once without remembering different passwords for each, and also allow a user to change the password freely and update it offline. In addition, the proposed schemes do not need to maintain a verification table and are also computationally efficient. Moreover, we propose a specific access right (AR) to verify the legitimate user who has different authorization levels on a server in a multi-server environment.

Key wordsAuthentication      Access right      Security      Geometry     
Received: 17 November 2009      Published: 09 December 2010
CLC:  TP309  
Cite this article:

Horng-Twu Liaw, Chih-Ta Yen, Meng-Yu Chiu, Li-Lin Hsiao. Efficient password authentication schemes based on a geometric approach for a multi-server environment. Front. Inform. Technol. Electron. Eng., 2010, 11(12): 989-997.

URL:

http://www.zjujournals.com/xueshu/fitee/10.1631/jzus.C0910712     OR     http://www.zjujournals.com/xueshu/fitee/Y2010/V11/I12/989


Efficient password authentication schemes based on a geometric approach for a multi-server environment

Password authentication schemes based on a geometric approach are proposed. Based on geometrics such as a plane or space, the proposed schemes can be used to fulfill the various requirements for security and achieve more efficient results. They allow a user to register with many servers once without remembering different passwords for each, and also allow a user to change the password freely and update it offline. In addition, the proposed schemes do not need to maintain a verification table and are also computationally efficient. Moreover, we propose a specific access right (AR) to verify the legitimate user who has different authorization levels on a server in a multi-server environment.

关键词: Authentication,  Access right,  Security,  Geometry 
[1] Hui-fang YU , Bo YANG. Low-computation certificateless hybrid signcryption scheme[J]. Front. Inform. Technol. Electron. Eng., 2017, 18(7): 928-940.
[2] Zhen-hua YUAN , Chen CHEN, Xiang CHENG , Guo-cheng LV, Liu-qing YANG , Ye JIN. Correlated channel model-based secure communications in dual-hop wireless communication networks[J]. Front. Inform. Technol. Electron. Eng., 2017, 18(6): 796-807.
[3] He-hao NIU, Bang-ning ZHANG, Dao-xing GUO, Yu-zhen HUANG, Ming-yue LU. Joint cooperative beamforming and artificial noise design for secure AF relay networks with energy-harvesting eavesdroppers[J]. Front. Inform. Technol. Electron. Eng., 2017, 18(6): 850-862.
[4] Yue-bin LUO, Bao-sheng WANG, Xiao-feng WANG, Bo-feng ZHANG. A keyed-hashing based self-synchronization mechanism for port address hopping communication[J]. Front. Inform. Technol. Electron. Eng., 2017, 18(5): 719-728.
[5] Hui Zhao, You-yu Tan, Gao-feng Pan, Yun-fei Chen. Ergodic secrecy capacity of MRC/SC in single-input multiple-output wiretap systems with imperfect channel state information[J]. Front. Inform. Technol. Electron. Eng., 2017, 18(4): 578-590.
[6] Gaurav Bansod, Narayan Pisharoty, Abhijit Patil. BORON: an ultra-lightweight and low power encryption design for pervasive computing[J]. Front. Inform. Technol. Electron. Eng., 2017, 18(3): 332-345.
[7] Huan-zhao Wang, Peng Zhang, Lei Xiong, Xin Liu, Cheng-chen Hu. A secure and high-performance multi-controller architecture for software-defined networking[J]. Front. Inform. Technol. Electron. Eng., 2016, 17(7): 634-646.
[8] Gui-lin CAI, Bao-sheng WANG, Wei HU, Tian-zuo WANG. Moving target defense: state of the art and characteristics[J]. Front. Inform. Technol. Electron. Eng., 2016, 17(11): 1122-1153.
[9] Hong-jiang Lei, Imran Shafique Ansari, Chao Gao, Yong-cai Guo, Gao-feng Pan, Khalid A. Qaraqe. Secrecy performance analysis of single-input multiple-output generalized-K fading channels[J]. Front. Inform. Technol. Electron. Eng., 2016, 17(10): 1074-1084.
[10] Guang-jia Song, Zhen-zhou Ji. Anonymous-address-resolution model[J]. Front. Inform. Technol. Electron. Eng., 2016, 17(10): 1044-1055.
[11] Kuo-Hui Yeh. A lightweight authentication scheme with user untraceability[J]. Front. Inform. Technol. Electron. Eng., 2015, 16(4): 259-271.
[12] Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan. ImgFS: a transparent cryptography for stored images using a filesystem in userspace[J]. Front. Inform. Technol. Electron. Eng., 2015, 16(1): 28-42.
[13] Tao Huang, Ying-lei Teng, Meng-ting Liu, Jiang Liu. Capacity analysis for cognitive heterogeneous networks with ideal/non-ideal sensing[J]. Front. Inform. Technol. Electron. Eng., 2015, 16(1): 1-11.
[14] Zhi-qiang Song, Hua-xiong Li, Chun-lin Chen, Xian-zhong Zhou, Feng Xu. Coordinated standoff tracking of moving targets using differential geometry[J]. Front. Inform. Technol. Electron. Eng., 2014, 15(4): 284-292.
[15] Ahmad Karim, Rosli Bin Salleh, Muhammad Shiraz, Syed Adeel Ali Shah, Irfan Awan, Nor Badrul Anuar. Botnet detection techniques: review, future trends, and issues[J]. Front. Inform. Technol. Electron. Eng., 2014, 15(11): 943-983.