Fairuz Shohaimay1,2, Eddie Shahril Ismail1,*
CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 6125-6145, 2022, DOI:10.32604/cmc.2022.022759
- 14 January 2022
Abstract Communication technology has advanced dramatically amid the 21st century, increasing the security risk in safeguarding sensitive information. The remote password authentication (RPA) scheme is the simplest cryptosystem that serves as the first line of defence against unauthorised entity attacks. Although the literature contains numerous RPA schemes, to the best of the authors’ knowledge, only few schemes based on the integer factorisation problem (IFP) and the discrete logarithm problem (DLP) that provided a provision for session key agreement to ensure proper mutual authentication. Furthermore, none of the previous schemes provided formal security proof using the random oracle… More >