Improving the C-Scheme by Allocating Unique Secret Parameters for Different Users

Jin Jiang,Zhihong Huang,Lei Li
DOI: https://doi.org/10.1109/cisw.2007.4425595
2007-01-01
Abstract:Different from conventional authentication approaches, an authentication scheme using n-dimensional construction method based on circle property(henceforth called C- Scheme) is proposed in paper[17]. Then the scheme is analyzed in improved respectively in paper[5] and paper[16]. However, this paper shows a weakness of the C-Scheme and proposes an improvement to the weakness by allocating unique secret parameters for different users in the C- Scheme. After analysis, the improved C-Scheme achieves a higher security level.
What problem does this paper attempt to address?