Title :
Improving the C-Scheme by Allocating Unique Secret Parameters for Different Users
Author :
Jiang, Jin ; Huang, Zhihong ; Li, Lei
Author_Institution :
South China Univ. of Technol., Guangzhou
Abstract :
Different from conventional authentication approaches, an authentication scheme using n-dimensional construction method based on circle property(henceforth called C- Scheme) is proposed in paper[17]. Then the scheme is analyzed in improved respectively in paper[5] and paper[16]. However, this paper shows a weakness of the C-Scheme and proposes an improvement to the weakness by allocating unique secret parameters for different users in the C- Scheme. After analysis, the improved C-Scheme achieves a higher security level.
Keywords :
authorisation; cryptography; message authentication; authentication scheme; authorised user identification; c-scheme-circle property; cryptanalysis; n-dimensional construction method; unique secret parameter allocation; Authentication; Computational intelligence; Data security; Equations; Geometry; Law; Legal factors; Paper technology; Smart cards;
Conference_Titel :
Computational Intelligence and Security Workshops, 2007. CISW 2007. International Conference on
Conference_Location :
Harbin
Print_ISBN :
978-0-7695-3073-4
DOI :
10.1109/CISW.2007.4425595