Remote authentication with forward security

  • Zhenchuan Chai
  • , Zhenfu Cao*
  • , Rongxing Lu
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Password authentication has been accepted as an easy-to-use solution in network environment to protect unauthorized access to a remote server. Although many schemes have been proposed, none of them can achieve survivability in case of compromise of a server. Once a server's secret key is leaked, the system is totally broken, and all the legally registered users have to be rejected for security reason, which is the most undesirable tragedy in business applications. In this paper, we propose a remote authentication scheme with forward security to reduce the potential damages caused by key exposure problem in authentication schemes. In our scheme, an intruder can not masquerade as an legal user registered at previous periods even if he has obtained server's secret keys.

Original languageEnglish
Title of host publicationAutonomic and Trusted Computing - Thrid International Conference, ATC 2006, Proceedings
PublisherSpringer Verlag
Pages418-427
Number of pages10
ISBN (Print)354038619X, 9783540386193
DOIs
StatePublished - 2006
Externally publishedYes
EventThrid International Conference on Autonomic and Trusted Computing, ATC 2006 - Wuhan, China
Duration: 3 Sep 20066 Sep 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4158 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceThrid International Conference on Autonomic and Trusted Computing, ATC 2006
Country/TerritoryChina
CityWuhan
Period3/09/066/09/06

Fingerprint

Dive into the research topics of 'Remote authentication with forward security'. Together they form a unique fingerprint.

Cite this