A PASSWORD-AUTHENTICATION SCHEME BASED ON SECURE TWO-PARTY COMPUTATION
Because of the convenience for using short secrets, the authentication based on password was very popular. But the password transferred on the internet was plain text or hash, which is easily decode or blown by the attackers. An equalitydetermination protocol is presented in this paper by developing the secure two-party computation protocol in 9, and the correctness and security are analyzed. Based on the protocol, an identity authentication scheme is presented. Even if the eavesdropper gets the cipher text, he cannot get any information about the password. The security of the scheme is analyzed at the end.
wireless network cryptography network security secure two-party computation identity authentic- ation equality-determination protocol
Qibo Sun Wenbin Wang Fangchun Yang Qian Xiao
State Key Lab Of Networking and Switching Technology, BUPT, Beijing 100876, China
国际会议
北京
英文
1-4
2008-09-26(万方平台首次上网日期,不代表论文的发表时间)