Loading [MathJax]/extensions/MathMenu.js
Cryptographic authentication of passwords | IEEE Conference Publication | IEEE Xplore
Scheduled Maintenance: On Monday, 30 June, IEEE Xplore will undergo scheduled maintenance from 1:00-2:00 PM ET (1800-1900 UTC).
On Tuesday, 1 July, IEEE Xplore will undergo scheduled maintenance from 1:00-5:00 PM ET (1800-2200 UTC).
During these times, there may be intermittent impact on performance. We apologize for any inconvenience.

Cryptographic authentication of passwords


Abstract:

A password authentication scheme based on El Gamal's (1985) public key cryptosystem and signature scheme is proposed. This scheme permits each user to choose passwords an...Show More

Abstract:

A password authentication scheme based on El Gamal's (1985) public key cryptosystem and signature scheme is proposed. This scheme permits each user to choose passwords and identities individually. The password is used as the user's secret key. Using the users public key and identity, the computer system can generate a set of test patterns and store them in a verification table. In the test pattern generation procedure, users do not need to submit their secret key. In the authentication procedure, the system does not need to use the system's secret key. Thus the system's secret key and users' secret key can be well protected.<>
Date of Conference: 01-03 October 1991
Date Added to IEEE Xplore: 06 August 2002
Print ISBN:0-7803-0120-X
Conference Location: Taipei, Taiwan

Contact IEEE to Subscribe

References

References is not available for this document.