{"title":"基于椭圆曲线密码的开放分布式系统智能卡身份远程认证","authors":"Shyi-Tsong Wu, J. Chiu, Bin-Chang Chieu","doi":"10.1109/EIT.2005.1627015","DOIUrl":null,"url":null,"abstract":"Elliptic curve cryptography sustains equal security for afar small key size. Recently the pairings operations on elliptic curve have received considerable attention. In this paper, we apply the cryptographic primitive of pairings on elliptic curve to a remote password authentication scheme with smart cards. The proposed pairing-based remote authentication scheme requires no password table to verify the legitimacy of the login user and allows the users to choose and change their password. The distributed remote hosts do not need the knowledge of the secret of the key information center to authenticate the legitimacy of the users. It enhances the flexibility of the remote authentication scheme","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"33","resultStr":"{\"title\":\"ID-based remote authentication with smart cards on open distributed system from elliptic curve cryptography\",\"authors\":\"Shyi-Tsong Wu, J. Chiu, Bin-Chang Chieu\",\"doi\":\"10.1109/EIT.2005.1627015\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Elliptic curve cryptography sustains equal security for afar small key size. Recently the pairings operations on elliptic curve have received considerable attention. In this paper, we apply the cryptographic primitive of pairings on elliptic curve to a remote password authentication scheme with smart cards. The proposed pairing-based remote authentication scheme requires no password table to verify the legitimacy of the login user and allows the users to choose and change their password. The distributed remote hosts do not need the knowledge of the secret of the key information center to authenticate the legitimacy of the users. It enhances the flexibility of the remote authentication scheme\",\"PeriodicalId\":358002,\"journal\":{\"name\":\"2005 IEEE International Conference on Electro Information Technology\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-05-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"33\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2005 IEEE International Conference on Electro Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EIT.2005.1627015\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2005 IEEE International Conference on Electro Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EIT.2005.1627015","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
ID-based remote authentication with smart cards on open distributed system from elliptic curve cryptography
Elliptic curve cryptography sustains equal security for afar small key size. Recently the pairings operations on elliptic curve have received considerable attention. In this paper, we apply the cryptographic primitive of pairings on elliptic curve to a remote password authentication scheme with smart cards. The proposed pairing-based remote authentication scheme requires no password table to verify the legitimacy of the login user and allows the users to choose and change their password. The distributed remote hosts do not need the knowledge of the secret of the key information center to authenticate the legitimacy of the users. It enhances the flexibility of the remote authentication scheme