期刊文献+

身份认证方案的安全性分析

Security Analysis of An Authentication Scheme
下载PDF
导出
摘要 针对入侵容忍身份认证方案的安全性进行了详细分析,并用状态转移图描述了系统的安全行为。该方案的特点是基于Shamir秘密共享算法将用户密码分片后存储在多个认证服务器中,使得少数服务器受到入侵时仍能继续提供正确的认证服务,且在认证身份时不需要重构用户原来的密码数据,提高了认证系统的可用性、完整性和机密性。 This paper gives a detailed analysis on the security of an authentication scheme with intrusion-tolerant feature. A state transition diagram is used to describe the security behavior of the system. The characteristics of the proposed scheme are that a user password is split to store in distributed shared servers by using Shamir's secret sharing. Thus, valid authentication services are continuously available even though the minority of shared servers are compromised. Moreover, the original password data is not required to be constructed during authentication processes. Hence, the availability, integrity and confidentiality of authentication system will be enhanced by means of the present scheme.
出处 《华东理工大学学报(自然科学版)》 CAS CSCD 北大核心 2009年第5期740-745,共6页 Journal of East China University of Science and Technology
关键词 认证 入侵容忍 秘密共享 安全分析 authentication intrusion-tolerant secret sharing security analysis
  • 相关文献

参考文献4

  • 1黄建华,程晓松,宋国新.具有入侵容忍特性的身份认证系统[J].计算机工程,2006,32(18):157-159. 被引量:3
  • 2Wu Thomas. A real-world analysis of kerberos password security[C]// Proceedings of Network and Distributed System Security Symposium. San Diego, Calif: ISOC, 1999 : 3-5.
  • 3Adi Shamir. How to share a secret[J]. Commun ACM, 1979, 22(11): 612-613.
  • 4Tompa M, Wolt H. How to share a secret with cheater[J]. Journal of Cryptology, 1988, 1: 133-139.

二级参考文献4

  • 1Wu T.A Real-world Analysis of Kerberos Password Security[C].Proc.of Network and Distributed System Security Symposium,San Diego,Calif.,1999.
  • 2Shamir A.How to Share a Secret[J].Communication of ACM,1979,22(11):612-613.
  • 3Courtney T,Lyons J,Ramasamy H V,et al.Providing Intrusion Tolerance with ITUA[C].Proc.of the 2002 International Conference on Dependable Systems and Networks,Piscataway,N J,USA,2002.
  • 4Wang F,Gong F,Jou F,et al.SITAR:A Scalable Intrusion Tolerance Architecture for Distributed Service[C].Proceedings of the 2001IEEE Workshop on Information Assurance and Security,2001-06:38-45.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部