Security

A Remote User Authentication Scheme Using Bilinear Pairings

Free registration required

Executive Summary

Authentication is a one of the main goal of cryptography. There are many techniques used for authentication but password-based authentication is one of the most convenient technique to verify the legitimacy of a user. Classification of password based authentication can be done into two categories such as hash-based authentication and public-key based authentication. The first well-known hash-based password authentication scheme was proposed by Lamport. Later, overcome the weakness of and proposed a modified scheme. Thereafter, many schemes and improvements on hash-based remote user authentication, have been proposed.

  • Format: PDF
  • Size: 412.15 KB