PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Robust User Password Change Scheme based on the Elliptic Curve Cryptosystem

Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In this paper, an efficient user password change scheme based on the elliptic curve discrete logarithm problem (ECDLP)is presented. In contrast to the existing password change schemes using a server’s public key, the proposed scheme can securely update user passwords without a complicated process and server’s public key, and also provides explicit key authentication in the case of a session key agreement.
Wydawca
Rocznik
Strony
483--492
Opis fizyczny
bibliogr. 10 poz., tab.
Twórcy
autor
autor
  • Department of Computer Engineering, Kyungpook National University, 1370 Sankyuk-Dong, Buk-Gu, Daegu 702-701, South Korea, ejyoon@tpic.ac.kr
Bibliografia
  • [1] Peyravian, M., Zunic, N.: Methods for Protecting Password Transmission, Computers & Security, 19(5), 2000, 466-469.
  • [2] Hwang, J.J., Yeh, T.C.,: Improvement on Peyravian-Zunic's Password Authentication Schemes, IEICE Transactions on Communications, E85-B(4), April 2002, 823-825.
  • [3] Lin, C.L., Hwang, T.: A Password Authentication Scheme with Secure Password Updating, Computers &Security, 22(1), 2003, 68-72.
  • [4] Yang, C.C., Chang, T.Y., Li, J.W.: Security Enhancement for Protecting Password Transmission, IEICE Transactions on Communications, E86-B(7), July 2003, 2178-2181.
  • [5] Miller, V.S.: Use of Elliptic Curves in Cryptography, Advances in Cryptology - Crypto '85, Springer-Verlag, 1986, 417-426.
  • [6] Koblitz, N.: Elliptic Curve Cryptosystems, Mathematics of Computation, 48, 1997, 203-209.
  • [7] Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer-Verlag. New York. Inc., 2004.
  • [8] RSA Laboratories.: Frequently Asked Questions about Today's Cryptography, Version 4.1, May 2000, 101-105.
  • [9] Menezes, A.J., Oorschot, P.C., and Vanstone, S.A.: Handbook of Applied Cryptograph, CRC Press, New York, 1997.
  • [10] Hwang, M.S., Lin, I.C., Li, L.H.: A Simple Micro-payment Scheme, The Journal of Systems and Software, 55, 2001, 221-229.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS5-0018-0050
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.