CLC number: TP309
On-line Access: 2024-08-27
Received: 2023-10-17
Revision Accepted: 2024-05-08
Crosschecked: 2010-08-14
Cited: 1
Clicked: 7472
Horng-Twu Liaw, Chih-Ta Yen, Meng-Yu Chiu, Li-Lin Hsiao. Efficient password authentication schemes based on a geometric approach for a multi-server environment[J]. Journal of Zhejiang University Science C, 2010, 11(12): 989-997.
@article{title="Efficient password authentication schemes based on a geometric approach for a multi-server environment",
author="Horng-Twu Liaw, Chih-Ta Yen, Meng-Yu Chiu, Li-Lin Hsiao",
journal="Journal of Zhejiang University Science C",
volume="11",
number="12",
pages="989-997",
year="2010",
publisher="Zhejiang University Press & Springer",
doi="10.1631/jzus.C0910712"
}
%0 Journal Article
%T Efficient password authentication schemes based on a geometric approach for a multi-server environment
%A Horng-Twu Liaw
%A Chih-Ta Yen
%A Meng-Yu Chiu
%A Li-Lin Hsiao
%J Journal of Zhejiang University SCIENCE C
%V 11
%N 12
%P 989-997
%@ 1869-1951
%D 2010
%I Zhejiang University Press & Springer
%DOI 10.1631/jzus.C0910712
TY - JOUR
T1 - Efficient password authentication schemes based on a geometric approach for a multi-server environment
A1 - Horng-Twu Liaw
A1 - Chih-Ta Yen
A1 - Meng-Yu Chiu
A1 - Li-Lin Hsiao
J0 - Journal of Zhejiang University Science C
VL - 11
IS - 12
SP - 989
EP - 997
%@ 1869-1951
Y1 - 2010
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/jzus.C0910712
Abstract: Password authentication schemes based on a geometric approach are proposed. Based on geometrics such as a plane or space, the proposed schemes can be used to fulfill the various requirements for security and achieve more efficient results. They allow a user to register with many servers once without remembering different passwords for each, and also allow a user to change the password freely and update it offline. In addition, the proposed schemes do not need to maintain a verification table and are also computationally efficient. Moreover, we propose a specific access right (AR) to verify the legitimate user who has different authorization levels on a server in a multi-server environment.
[1]Hwang, M.S., Chong, S.K., Chen, T.Y., 2010. DoS-resistant ID-based password authentication scheme using smart cards. J. Syst. Softw., 83(1):163-172.
[2]Juang, W.S., 2004. Efficient password authenticated key agreement using smart cards. Comput. & Secur., 23(2):167-173.
[3]Lamport, L., 1981. Password authentication with insecure communication. Commun. ACM, 24(11):770-772.
[4]Liao, C.H., Chen, H.C., Wang, C.T., 2009. An exquisite mutual authentication scheme with key agreement using smart card. Informatica, 33(2):117-124.
[5]Liao, Y.P., Wang, S.S., 2009. A secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Stand. Interf., 31(1):24-29.
[6]Lin, I.C., Hwang, M.S., Li, L.H., 2003. A new remote user authentication scheme for multi-server architecture. Fut. Gener. Comput. Syst., 19(1):13-22.
[7]Rhee, H.S., Kwon, J.O., Lee, D.H., 2009. A remote user authentication scheme without using smart cards. Comput. Stand. Interf., 31(1):6-13.
[8]Tsai, J.L., 2008. Efficient multi-server authentication scheme based on one-way hash function without verification table. Comput. & Secur., 27(3-4):115-121.
[9]Tsaur, W.J., Wu, C.C., Lee, W.B., 2005. An enhanced user authentication scheme for multi-server Internet services. Appl. Math. Comput., 170(1):258-266.
[10]Yoon, E.J., Ryu, E.K., Yoo, K.Y., 2004. Further improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron., 50(2):612-614.
Open peer comments: Debate/Discuss/Question/Opinion
<1>