There is a plateau that is the closest place to God, whose location is in the southwest of China – Tibet. Since ancient times, the local monks of high attainment “Living Buddha” have always performed secret transmigrations. Some people said that after a Living Buddha has had a perfect rest, he will transmigrate to save all beings with mercy. Thus, the pupils should look for another little transmigrated Living Buddha as the Living Buddha has got a perfect rest. The pupils only know the Living Buddha has attained “Paramita Wisdom”, which is the acme of wisdom, but it cannot be explained because it is without form. How do the pupils judge and find a little boy who possesses the “Paramita Wisdom” of a Living Buddha? If the pupils can prove a little boy is a transmigrated Living Buddha, they must also be able to prove the little boy has “Paramita Wisdom”. However, no one knows what “Paramita Wisdom” is. This story is quite similar to the problem, “Password Authentication” that we want to solve. When a user wants to prove his identification to the computer center, he has to prove that he knows the password; but he does not want to expose his password during the identification process in order to avoid compromising his password to personnel of the center or an interceptor on the network. We hope the password authentication system can solve these following problems: • In order to avoid interior personnel of the center from disclosing any passwords, the password table or the verification table must not be stored inside the computer. • Passwords should not be transmitted in any form between the terminal and the center. This prevents any interceptor from stealing any password by way of the network. • Passwords must not be exposed during the process of authentication in any way. • Users must be able to freely change their own passwords. • The length of a password must be appropriate for memorization. • The authentication system must be efficient and practical. • The authentication system must keep up with the speed of technological change. We present in this paper a practical system to solve the problems of authentication with the concept of public key distribution.