期刊文献+

基于ECC的双因素身份认证的设计与实现 被引量:3

Design and Implementation of Dual Factors Identity Authentication Based on ECC
下载PDF
导出
摘要 为消除基于指纹识别技术的身份认证的安全隐患和基于动态口令的身份认证技术的安全漏洞,提出在椭圆曲线加密体制下,将指纹识别技术和动态口令技术结合起来的增强型双因素身份认证方案。研究动态口令随机数生成器、动态口令及指纹序列的加密方案的设计,并对认证系统的性能和安全性进行分析。 In order to eliminate the potential safety problems of fingerprint identification and the security loopholes of dynamic password authentication, an enhanced two-factor identity authentication scheme based on ECC is designed. The random number generator, the encipherment scheme of the dynamic password and the fingerprint sequence are designed. And the performance and security of the authentication system are analysed.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第9期124-126,共3页 Computer Engineering
关键词 身份认证 动态口令 指纹识别 椭圆曲线 identity authentication dynamic password fingerprint identification elliptic curve
  • 相关文献

参考文献5

二级参考文献37

  • 1卢昌荆,史开泉.图像的二维混合迭代加密识别[J].山东大学学报(工学版),2003,33(6):681-684. 被引量:2
  • 2I Lamport L.Password Authentication with Insecure Communication. Communications of the ACM,1981,24( 11 ):770-772.
  • 3Hailer N.RFC 1760:The S/Key One-time Password System. 1995-02.
  • 4Hailer N M.The S/Key One-time Password Svstem.ISOC.1994.
  • 5Sandiringama M,Shimizu A,Noda M T.Simple and Secure Password Authentication Protocol.lEICE Trans. Comm.,2000,E83-B(6):1363.
  • 6Feng Dengguo.Analytics of Cryptograph.Beijing:Tsinghua University Press,2000.
  • 7Schncier B.Applied Cryptography:Protocols,Algorithms,and Source Code in C(Second Edition).Beijing: China Machine Press,2000.
  • 8Hung-Yu Chien,Yi-hwa Chen,Jinn-ke Jan,et al.Cryptanalysis on Dynamic Authentication Protocol for Personal Communication System. Electronics Letters,2001,37( 14):895-896.
  • 9SHI Kaiquan, CUI Yuquan. Both-branch fuzzy decision and decision encryption-authentication [ J ]. SCIENCE IN CHINA(series F): Information Scinences, 2003,46(2):90-103.
  • 10KOBLITZ N. Elliptic curve cryptosystems[J]. Mathematics of Computation, 2000,198(17):203-209.

共引文献31

同被引文献13

  • 1田野,张玉军,刘莹,李忠诚.移动IPv6网络基于身份签名的快速认证方法[J].软件学报,2006,17(9):1980-1988. 被引量:12
  • 2wikipedia ,Two-factor authentication. http://en.wikipedia.org/wiki/Twofactor_authentication.
  • 3李欣,沈寒辉.一种基于SIM卡的windows mobile双因素用户认证技术[J].第23届全国计算机安全学术交流会论文集.
  • 4李国庆,汤灿琴,李纪波.一般拓扑学[M].长沙:湖南大学出版社,2006.
  • 5Eronen P, Hiller T, Zorn G. Diameter Extensible Authentication Protocol(EAP) Application[S]. RFC 4072, 2005.
  • 6贺听,李斌异构无线网络切换技术[M].北京:北京邮电大学出版社,2008.
  • 7Canetti R. Universally Composable Security: A New Paradigm for Cryptographic Protocols[C]//Proc. of the 42nd IEEE Symposium on Foundations of Computer Science. Las Vegas, USA: IEEE Computer Society, 2004.
  • 8Canetti R. Universally Composable Signature, Certification and Authentication[C]//Proc. of the 17th IEEE Computer Security Foundations Workshop. [S.l.]: IEEE Computer Society, 2004.
  • 9叶阮健,曹英.经典密码学与现代密码学[M].北京:清华大学出版社,2005.
  • 10李虹.基于生物特征点拓扑结构的非对称加解密方法[P].中国:CN200910095294.X,2009.

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部