期刊文献+

新的在标准模型中可证安全身份鉴别协议

New provably secure identification protocol in standard model
下载PDF
导出
摘要 基于RSA衍生的判定性DependentRSA问题的困难性假设,提出一个安全高效的身份鉴别方案。在标准模型下,可证明该身份鉴别协议在主动并行攻击下能抵抗冒充攻击和中间人攻击。由于交互简单自然、低存储量、低计算量和好的安全性能,该身份鉴别协议更适合用于广泛应用的智能卡。 Based on the hardness assumption of the decisional relevant RSA ( DDRSA for short, which derived from RSA problem), presented a secure and efficient identification protocol. Proved the proposed identification protocol secure against impersonation and man-in-the-middle attack under both active and concurrent attacks in standard model. Due to its simplicity and naturalness, low-memory, low-computation loads, and better security, the proposed scheme is well suitable for using in smart cards.
作者 李艳平
出处 《计算机应用研究》 CSCD 北大核心 2009年第6期2138-2140,共3页 Application Research of Computers
基金 陕西省自然科学基础研究计划资助项目(2007A06)
关键词 身份鉴别协议 中间人攻击 RSA问题 标准模型 identification protocols man-in-the-middle attack RSA problem standard model
  • 相关文献

参考文献8

  • 1GUILLOU L S, QUISQUATER J J. A practical zero-knowledge protocol fitted to security microprocessors minimizing both transmission and memory [ C ]//GUNTHER C G. Proc of EUROCRYPTO' 88. Berlin : Springer-Verlag, 1988 : 123-128.
  • 2SCHNORR C P. Efficient identification and signatures for smart cards [ C ]//Proc of CRYPTO ' 89. Berlin : Springer-Verlag, 1990:239-252.
  • 3BELLARE M,PALACIOY A. GQ and Schnorr identification schemes: proofs of security against impersonation under active and concurrent attacks [ C ]//YUNG M. Proc of CRYPTO ' 02. Berlin : Springer-Verlag, 2002 : 167-177.
  • 4TSENG Y M, JAN J K. ID-based cryptographic schemes using a noninteractive public-key distribution system [ C ]//Proc of the 14th Annual Computer Security Applications Conference. Washington DC: IEEE Computer Society, 1998:237-243.
  • 5HWANG M S, LO M S, LIN S C. An efficient user identification scheme based on ID-based cryptosystem[ J ]. Computer Standards & Interfaces ,2004,26 ( 6 ) :565-569.
  • 6TANG Qiang, MITCHELL C J. Cryptanalysis of two identification schemes based on an ID-based cryptosystem [ J]. Communications, IEE Proceedings, 2005,152 ( 5 ) :723- 724.
  • 7SHAO Jun, CAO Zhen-fu, LU Rong-xing. A new efficient identification scheme based on strong Diffie-Hellman assumption [ C]//Proc of International Symposium on Future Software Technology (ISFST-2004). Software Engineers Association,2004.
  • 8POINTCHEVAL D. New public key cryptosystems based on the dependent RSA problems [ C ]//STERN J. Proc of EUROCRYPT'99. Heidelberg, Berlin : Springer-Verlag, 1999:239-254.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部