期刊文献+

基于身份的远程用户认证方案 被引量:5

Identity-based Remote User Authentication Schemes
下载PDF
导出
摘要 研究近期提出的2个远程用户认证方案,对其进行伪造攻击。利用基于身份的签名思想提出一个基于身份的远程用户认证方案,在实现动态认证的同时无须用户与远程服务器端交互,通信量小,远端服务器无须保存或维护任何口令或验证表,存储代价低,可以避免口令攻击、重放攻击、伪造攻击、中间人攻击等,安全性高。 Two remote user authentication schemes proposed recently are studied,they are both vulnerable to forgery attacks.Identity-based remote user authentication scheme using identity-based signature system is presented.It obtains low communicational cost and dynamic authentication service without interaction between the user and the remote server,achieves little storage in the remote server because it does not need reserve or maintain any password or any table for verification.Its security is high for the reason that it can avoid some familiar attacks such that password attacks,replay attacks,forgery attacks,man-in-the-middle attacks and so on.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第12期149-151,共3页 Computer Engineering
基金 现代通信国家重点实验室基金资助项目(51436020405JB5205)
关键词 认证 双线性对 智能卡 口令 时戳 authentication bilinear parings smart card password timestamp
  • 相关文献

参考文献7

  • 1Das M L, Saxena A, Gulati V E et al. A Novel Remote User Authentication Scheme Using Bilinear Pairings[J]. Computers & Security, 2005, 24(2): 35-40.
  • 2Chou J S, Chen Yalin, Lin J Y. Improvement of Manik et al.'s Remote User Authentication Scheme[Z]. (2005-07-25). http://eprint. iacr.org/2005/450.pdf.
  • 3Thulasi G Das M L, Saxena A. Cryptanalysis of Recently Proposed Remote User Authentication Schemes[Z]. (2006-06-04). http:// eprint.iacr.org/2006/028.pdf.
  • 4胡斌,王永红.一种安全的远程用户认证方案[J].计算机工程,2007,33(7):146-148. 被引量:1
  • 5Fang Guanfei, Huang Genxun. Improvement of Recently Proposed Remote User Authentication Schemes[Z]. (2006-01-03). http:// eprint.iacr.org/2006/200.pdf.
  • 6Hess E Exponent Group Signature Schemes and Efficient Identitybased Signature Schemes Based on Pairings[Z]. (2002-01-02). http://eprint.iacr.org/2002/012/.
  • 7Zhang Fanguo, Kim K. Signature-masked Authentication Using the Bilinear Pairings[Z]. C&IS Lab, 2002.

二级参考文献7

  • 1Wang T Y.Password authentication Using Public-Key Encryption[C]// Proceedings of International Carnahan Conference on Security Technology.1983:35-38.
  • 2Shamir.Identity Based Cryptosystems and Signature Schemes[C]// Proc.of CRYPTO'84.1984:47-53.
  • 3Chin C C,Ren J H,Daniel J B.Using Smart Cards to Authenticate Passwords[C]//Proceedings of IEEE International Carnahan Conference on Security Technology,Canada.1993:154-156.
  • 4Lee C C,Hwang M S.A Flexible Remote User Authentication Scheme Using Smart Cards[J].ACM Operating Systems Review,2002,36 (3):46-52.
  • 5Das M L,Saxena A.A Novel Remote User Authentication Scheme Using Bilinear Pairings[J].Computers and Security,2005,24(2):35-40.
  • 6Chou J S,Chen Y,Lin J Y.Improvement of Manik et al's Remote User Authentication Scheme[Z].http://eprint.iacr.org/2005/450.pdf.
  • 7Thulasi G,Das M L,Saxena A.Cryptanalysis of recently Proposed Remote User Authentication Schemes[Z].http://eprint.iacr.org/ 2006/028.pdf.

同被引文献38

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部