{"title":"Using smart cards to authenticate passwords","authors":"C. Chang, Ren-Junn Hwang, D. Buehrer","doi":"10.1109/CCST.1993.386808","DOIUrl":null,"url":null,"abstract":"A password authentication scheme which can verify remote passwords without the use of a verification table is presented. Each user possesses a smart card which is used for login and authentication, as introduced by A. Shamir (1985). During the login, the user types in his identity and the password associated with his smart card, along with the identity of the other user with whom he wishes to communicate. The smartcard uses a signature scheme to check whether or not the login can be accepted. As well as modifying Shamir's algorithm for the signature scheme checking by using a theorem about relatively prime numbers, one also adds communication timestamps to prevent replaying of a previously intercepted login request.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"68 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.1993.386808","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11
Abstract
A password authentication scheme which can verify remote passwords without the use of a verification table is presented. Each user possesses a smart card which is used for login and authentication, as introduced by A. Shamir (1985). During the login, the user types in his identity and the password associated with his smart card, along with the identity of the other user with whom he wishes to communicate. The smartcard uses a signature scheme to check whether or not the login can be accepted. As well as modifying Shamir's algorithm for the signature scheme checking by using a theorem about relatively prime numbers, one also adds communication timestamps to prevent replaying of a previously intercepted login request.<>