期刊文献+

基于集合调和的远程口令恢复方法 被引量:2

Remote password recovery using set reconciliation
下载PDF
导出
摘要 基于对多项式编码的集合调和方法的研究,提出一种简单的远程口令恢复新方法。其利用容易记忆的低熵口令集经hash变换后加密并存储高熵口令;利用集合调和多项式容错求解得到原始的低熵口令集,从而恢复高熵口令。同时,提供了两个安全的远程口令恢复协议。分析表明,此方法可以安全广泛地应用到远程应用系统中。 Proposed a simple and novel scheme for remote password recovery based on set reconciliation. Used the set of low entropy passwords to recover a high entropy password. Accomplished the random map of password set using standard hash function. And symmetric cryptography essentially acted as high entropy password storing. Demonstrated two security protocols how to realize the process of password recovery between the end user Alice and the service provider Trent.
出处 《计算机应用研究》 CSCD 北大核心 2009年第6期2113-2115,2121,共4页 Application Research of Computers
基金 中国留学基金委资助项目 国家自然科学基金资助项目(10471151) 国家"863"计划资助项目(2003AA148040)
关键词 口令 集合调和 加密 特征多项式 password set reconciliation encryption characteristic polynomial
  • 相关文献

参考文献13

  • 1TSAI C S,LEE C C, HWANG M S. Password authentication schemes: current status and key issues [ J ]. International Joural of Network Security,2006,93 ( 2 ) : 101-115.
  • 2LEE J K, RYU S R, YOO K Y. Finger-based remote user authentication scheme using smart cards [ J ]. Electronics Letters, 2006,38 (12) :554-555.
  • 3CLARK P C, HOFFMAN L J. BITS : a smartcard protected operating system[J]. Communications of the ACM ,1994,37(11) :66-94.
  • 4JAIN A K,ROSS A,PANKANTI S. Biometrics: a tool for information security[ J ]. IEEE Information Forensics and Security, 2006,1 (2) :125-143.
  • 5SIYAL M Y, AHMED F. A biometric-based scheme for enhancing security of cryptographic keys [C]//Proc of IEEE Region 10 Conference. Piscataway, NJ : IEEE Press ,2004:407-410.
  • 6HAMILTON S S, CARLISLE M C, HAMILTON J A. A global look at authentication[ C ]//Proc of IEEE SMC Information Assurance and Security Workshop. West Point, NY : [ s. n. ] ,2007 : 1-8.
  • 7FRYKHOLM N, JUEKS A. Error-tolerant password recovery [ C ]// Proc of the 8th ACM Conference on Computer and Communications Security. New York : ACM Press,2001 : 1 - 8.
  • 8MENEZES A, OORSCHOT P V, VANSTONE S A. Handbook of applied cryptography[M]. [ S. l. ] :CRC Press, 1996.
  • 9SHAMIR A. How to share a secret[ J]. Communications of the Association for Computing Machinery, 1979,22( 11 ) :612-613.
  • 10JUELS A, WATTENBERG M. A fuzzy commitment scheme[ C ]//Proc of the 5th ACM Conference on Computer and Communications Security. New York : ACM Press, 1999:28- 36.

同被引文献27

  • 1MINSKY Y, TRACHTENBERG A, ZIPPEL R. Set reconciliation with nearly optimal communication complexity[J]. IEEE Information Theory, 2003, 49(9): 2213-2218.
  • 2DECANDIA G, HASTORUN D, JAMPANI M, et al. Dynamo: amazon's highly available key-value store[A]. Proceedings of the 21st ACM SIGOPS Symposium on Operating Systems Principles[C]. New York, NY, USA, 2007. 205-220.
  • 3ELKOUSS D, MARTINEZ J, LANCHO D, et al. Rate compatible protocol for information reconciliation: an application to QKD[A]. Proceedings of the Information Theory Workshop (ITW)[C]. 2010. 145-149.
  • 4GUO K, HAYDEN M, VAN RENESSE R, et al. GSGC: An Efficient Gossip-Style Garbage Collection Scheme for Scalable Reliable Multicast[R]. Cornell University, 1997.
  • 5STAROBINSKI D, TRACHTENBERG A, AGARWAL S. Efficient PDA synchronization[J]. 1EEE Transactions on Mobile Computing, 2003, 2(1): 40-51.
  • 6VAN RENESSE R. Scalable and secure resource location[A]. Proceedings of the International Conference on System Sciences[C]. 2000. 1530-1605.
  • 7Data domain[EB/OL], http://www.datadomain.com.
  • 8ZHU B, LI K, PATTERSON H. Avoiding the disk bottleneck in the data domain deduplication file system[A]. Proceedings of the 6th USENIX Conference on File and Storage Technologies[C[. San Jose, California, 2008.1-14.
  • 9KULKARN1 P, DOUGLIS F, LAVOIE J, et al. Redundancy elimination within large collections of files[A]. Proceedings of the Annual Conference on USENIX Annual Technical Conference[C].Boston, MA, 2004.
  • 10BOLOSKY W J, CORBIN S, GOEBEL D, et al. Single instance storage in Windows 2000[A]. Proceedings of the 4th Conference on USENIX W'mdows Systems Symposium[C]. Seattle, Washington, 2000.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部