{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:33:35Z","timestamp":1762004015037},"reference-count":11,"publisher":"Wiley","issue":"7","license":[{"start":{"date-parts":[[2007,3,22]],"date-time":"2007-03-22T00:00:00Z","timestamp":1174521600000},"content-version":"vor","delay-in-days":5924,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Systems &amp; Computers in Japan"],"published-print":{"date-parts":[[1991,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>A new password\u2010based authentication system CINON is proposed for use in communications and computer systems. It employs a one\u2010way function to perform the required authentication of communicating users. CINON maintains its security in spite of a wiretap or the theft of a password file, and it is not necessary to replace the correspondents' public passwords. CINON can be realized with only a few computations.<\/jats:p><jats:p>This paper evaluates the CINON system and compares it with the Lamport authentication system, an earlier system which uses a one\u2010way data transformation. In comparison with the Lamport system, CINON's execution speed is faster by a factor of perhaps several hundred to a thousand.<\/jats:p>","DOI":"10.1002\/scj.4690220704","type":"journal-article","created":{"date-parts":[[2007,7,7]],"date-time":"2007-07-07T21:16:38Z","timestamp":1183842998000},"page":"32-40","source":"Crossref","is-referenced-by-count":40,"title":["A dynamic password authentication method using a one\u2010way function"],"prefix":"10.1002","volume":"22","author":[{"given":"Akihiro","family":"Shimizu","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2007,3,22]]},"reference":[{"key":"e_1_2_1_2_2","unstructured":"A.Shamir.Identity\u2010based cryptosystems and signature schemes. Advances in Cryptology CRYPTO '84 Springer\u2010Verlag Lecture Notes in Computer Science196(1985)."},{"key":"e_1_2_1_3_2","doi-asserted-by":"crossref","unstructured":"A.FiatandA.Shamir.How to prove yourself: Practical solutions to identification and signature problems. Advances in Cryptology CRYPTO '86 Springer\u2010Verlag Lecture Notes in Computer Science 263 pp.186\u2013194(1987).","DOI":"10.1007\/3-540-47721-7_12"},{"key":"e_1_2_1_4_2","doi-asserted-by":"crossref","unstructured":"K.OhtaandT.Okamoto.A modification of the Fiat\u2010Shamir scheme. Advances in Cryptology CRYPTO '88(Aug.1988).","DOI":"10.1049\/el:19880650"},{"key":"e_1_2_1_5_2","unstructured":"A.ShimizuandT.Yamakami.Intelligent LAN security management. ICIN '89 Proceedings pp.84\u201388(1989)."},{"key":"e_1_2_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/361082.361087"},{"key":"e_1_2_1_7_2","unstructured":"R.MorrisandK.Thompson.Password security: A case history. UNIX Programmer's Manual seventh edition 2B(June1979)."},{"key":"e_1_2_1_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"e_1_2_1_9_2","unstructured":"(U.S.) National Bureau of Standards. Data Encryption Standard FIPS\u2010PUB\u201045 (1977)."},{"key":"e_1_2_1_10_2","first-page":"1413","article-title":"The fast data encipherment algorithm FEAL","volume":"70","author":"Shimizu A.","year":"1987","journal-title":"Trans. I.E.I.C.E."},{"key":"e_1_2_1_11_2","doi-asserted-by":"crossref","unstructured":"A.ShimizuandS.Miyaguchi.Fast data encipherment algorithm FEAL. EUROCRYPT '87 Proceedings pp.267\u2013278(1987).","DOI":"10.1007\/3-540-39118-5_24"},{"key":"e_1_2_1_12_2","first-page":"321","article-title":"The FEAL\u20108 encipherment algorithm","volume":"37","author":"Miyaguchi S.","year":"1988","journal-title":"Research Reports"}],"container-title":["Systems and Computers in Japan"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fscj.4690220704","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/scj.4690220704","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T01:28:17Z","timestamp":1698024497000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/scj.4690220704"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1991,1]]},"references-count":11,"journal-issue":{"issue":"7","published-print":{"date-parts":[[1991,1]]}},"alternative-id":["10.1002\/scj.4690220704"],"URL":"https:\/\/doi.org\/10.1002\/scj.4690220704","archive":["Portico"],"relation":{},"ISSN":["0882-1666","1520-684X"],"issn-type":[{"value":"0882-1666","type":"print"},{"value":"1520-684X","type":"electronic"}],"subject":[],"published":{"date-parts":[[1991,1]]}}}