会议专题

A PASSWORD-AUTHENTICATION SCHEME BASED ON SECURE TWO-PARTY COMPUTATION

Because of the convenience for using short secrets, the authentication based on password was very popular. But the password transferred on the internet was plain text or hash, which is easily decode or blown by the attackers. An equalitydetermination protocol is presented in this paper by developing the secure two-party computation protocol in 9, and the correctness and security are analyzed. Based on the protocol, an identity authentication scheme is presented. Even if the eavesdropper gets the cipher text, he cannot get any information about the password. The security of the scheme is analyzed at the end.

wireless network cryptography network security secure two-party computation identity authentic- ation equality-determination protocol

Qibo Sun Wenbin Wang Fangchun Yang Qian Xiao

State Key Lab Of Networking and Switching Technology, BUPT, Beijing 100876, China

国际会议

China-Ireland International Conference on Information and Communications Technologies 2008(2008 中国-爱尔兰信息与通信技术国际会议 CIICT 2008)

北京

英文

1-4

2008-09-26(万方平台首次上网日期,不代表论文的发表时间)