1999
DOI: 10.1016/s0140-3664(98)00215-1
|View full text |Cite
|
Sign up to set email alerts
|

Remote password authentication scheme based on cross-product

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
13
0

Year Published

2003
2003
2015
2015

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 37 publications
(13 citation statements)
references
References 9 publications
0
13
0
Order By: Relevance
“…1,2,3, 4,5,6,7,8,9,10 In 1981, Lamport proposed a remote authentication scheme for communication through insecure channels. 11 Lamport's scheme can withstand the replay attack and it needs a verification table to verify the legality of the login user.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…1,2,3, 4,5,6,7,8,9,10 In 1981, Lamport proposed a remote authentication scheme for communication through insecure channels. 11 Lamport's scheme can withstand the replay attack and it needs a verification table to verify the legality of the login user.…”
Section: Introductionmentioning
confidence: 99%
“…20 Later, Wu proposed an efficient remote authentication scheme based on a simple geometric approach. 21 Wu's scheme makes possible the user to choose his/ her password at will.…”
Section: Introductionmentioning
confidence: 99%
“…Basically, these protocols must rely on some robust cryptographic or mathematical foundations, such as discrete logarithms [6,10] or quadratic residues [4], to guarantee their security. Tan and Zhu introduced the first remote password authentication scheme based on inner and cross products of matrixes [9]. In the protocol of [9], the system computes and records the secret information in each issued smart card via performing matrix multiplications and cross-product computations on some security parameters, and each user must also perform matrix inner-product computations to form her/his login request message.…”
Section: Introductionmentioning
confidence: 99%
“…Tan and Zhu introduced the first remote password authentication scheme based on inner and cross products of matrixes [9]. In the protocol of [9], the system computes and records the secret information in each issued smart card via performing matrix multiplications and cross-product computations on some security parameters, and each user must also perform matrix inner-product computations to form her/his login request message. Through the normalization of matrixes defined in [9], the system can check if a login request message is valid without keeping a large verification table.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation