期刊文献+

基于RSA体制的数字移动通信系统用户认证方案 被引量:1

RSA-based user authentication scheme for mobile communication networks
下载PDF
导出
摘要 设计了一种基于RSA体制的数字移动通信系统的用户身份认证方案.其安全性基于大整数的分解难题,能抵抗包括网内攻击的多种攻击.用户请求采用预计算的方式,有效减少了实时计算量,满足移动通信系统中用户请求的实时性要求.与基于离散对数的方案相比,本方案用户端和网络中心的计算量与存储量少,能高效实现连续请求.理论分析表明:本方案安全性高,计算复杂性和通信量低,网络中心存储量低,符合数字移动通信系统要求. On the basis of RSA cryptosystem, a user authentication scheme for digital mobile communication networks is proposed, whose security is based on large integer factorization to resist several kinds of attacks including inside-attacks. Pre-calculation was used in user ends to reduce the real-time calculation and make the scheme satisfy real-time requirement of mobile communication system. Compared with the scheme based on DLP, the scheme reduces the computation and storage both in the user ends and the net center, which makes sequential requests more efficient. Analytical results show that the scheme can meet the requirements of mobile communication because of its high security, lower calculative complexity and less storage demands.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2007年第4期11-13,共3页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(60403027)
关键词 数字移动通信 RSA体制 认证方案 digital mobile communication RSA cryptosystem authentication scheme
  • 相关文献

参考文献5

二级参考文献9

  • 1刘建伟.数字移动通信网中的用户认证方案[J].空军电讯工程学院学报,1995(1):12-18. 被引量:4
  • 2徐胜波 王新梅.数字移动通信网中认证与密钥分配方案的研究.密码学进展-Chinacrypto'96[M].北京:科学出版社,1996.128-139.
  • 3LTAKURA K, NAKAMURA K. A public key cryptosystem suitable for digital multi-signature[J]. NEC Res and Develop,1983,71(10): 1-8.
  • 4BOYD C, Multi-signature based on zero knowledge schemes[J], Electronic Letter, 1991,27(22): 2002-2004.
  • 5HARDJONO T, ZHENG Y .A practical digital multi-signature scheme based on discrete logarithm[A]. Advances in Cryptology-AUSCRPTO's92[C]. Springer-verlag, 1993. 16-21.
  • 6HAM L, KIELSER T. New scheme for digital multi-signature[J] .Electronic Letter, 1989, 25 (15): 1002-1003.
  • 7OKAMOTO T. A digital multi-signature scheme using bi-jective public key cryptosystems[.I]. ACM Trans Computer system,1988,6(8): 432-441.
  • 8WU T C, CHOU S L. Two ID-base, d multi-signature protocols for sequential and broadcasting architecture[J]. Compter Communications, 1996, 19(2): 851-856.
  • 9HONG G, YANG C S. Key authentication scheme for cryptosystem based on discrete logarithms[J] .Comp Comm 1996, 19(4): 848-850.

共引文献40

同被引文献6

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部