Paper Abstract and Keywords |
Presentation |
2009-06-18 14:20
* Satoshi Hashimoto (Kobe Univ.), Ryoichi Isawa (CRYPTO Co., Ltd.), Tatsuya Takehisa (Japan Datacom Co., Ltd.), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-7 ICSS2009-15 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
In 2008, Nakano et al. proposed a password authentication method, which is secure against the stolen-verifier attack. However, Nakano et al. method is a problem in safety because it input the fixed password each time in the authentication session. In this paper, we propose a secure password authentication method against stolen-verifier attack and all other already-known attacks. The proposal method is secure because it generates the authentication information by using not the fixed password but the updated private key each session. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
authentication / one-time password / stolen-verifier attack / / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 109, no. 85, IA2009-7, pp. 37-42, June 2009. |
Paper # |
IA2009-7 |
Date of Issue |
2009-06-11 (IA, ICSS) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
IA2009-7 ICSS2009-15 |
Conference Information |
Committee |
IA ICSS |
Conference Date |
2009-06-18 - 2009-06-19 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Kikai-Shinko-Kaikan Bldg |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
Internet Security, etc. |
Paper Information |
Registration To |
IA |
Conference Code |
2009-06-IA-ICSS |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
* |
Sub Title (in English) |
|
Keyword(1) |
authentication |
Keyword(2) |
one-time password |
Keyword(3) |
stolen-verifier attack |
Keyword(4) |
|
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Satoshi Hashimoto |
1st Author's Affiliation |
Kobe University (Kobe Univ.) |
2nd Author's Name |
Ryoichi Isawa |
2nd Author's Affiliation |
CRYPTO CO.,LTD (CRYPTO Co., Ltd.) |
3rd Author's Name |
Tatsuya Takehisa |
3rd Author's Affiliation |
Japan Datacom Co., Ltd. (Japan Datacom Co., Ltd.) |
4th Author's Name |
Masakatu Morii |
4th Author's Affiliation |
Kobe University (Kobe Univ.) |
5th Author's Name |
Koji Nakao |
5th Author's Affiliation |
National Institute of Information and Communications Technology (NICT) |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2009-06-18 14:20:00 |
Presentation Time |
25 minutes |
Registration for |
IA |
Paper # |
IA2009-7, ICSS2009-15 |
Volume (vol) |
vol.109 |
Number (no) |
no.85(IA), no.86(ICSS) |
Page |
pp.37-42 |
#Pages |
6 |
Date of Issue |
2009-06-11 (IA, ICSS) |
|