期刊文献+

改进的基于椭圆曲线的智能卡认证方案 被引量:1

Improved smart card authentication scheme based on elliptic curve cryptography
下载PDF
导出
摘要 分析了Wang等人基于智能卡的身份认证方案,指出方案中存在的安全性问题,提出了改进方案。与Wang等人的方案相比,改进方案可以抵抗密码猜测攻击和Denning-Sacco攻击,并且改进方案应用了椭圆曲线密码机制,对于存储空间与处理能力受限的智能卡有极大的帮助,证实了该方案是一个高效、安全的身份认证方案。 This paper proposed an improved scheme for security issues in wang's scheme.This scheme can avoid guessing attack and Denning-Sacco attack;at the same time,applying elliptic curve cryptograph in the smart card improved smart card's limitation of the memory size and processing power,so this scheme is a highly efficient,secure authentication program.
作者 李方伟 张鑫
出处 《重庆邮电大学学报(自然科学版)》 北大核心 2010年第4期483-486,共4页 Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition)
基金 重庆市教委科学技术研究项目(KJ090510) 重庆市自然科学基金项目(CSTC 2007BB2388)~~
关键词 椭圆曲线 智能卡 离散对数 安全性 elliptic curves cryptography (ECC) smart card digital logarithm security
  • 相关文献

参考文献6

  • 1WANG X M, ZHANG W F, ZHANG J S,et al. Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards [ J ]. Computer Standards & Interfaces, 2007, 29 (5) : 507-512.
  • 2王育民,刘建伟.通信网的安全-理论与技术[M].西安:电子科技大学出版社,2002.
  • 3朱浩瑾,曹珍富.基于智能卡的椭圆曲线动态身份认证体制[J].计算机工程,2006,32(2):135-136. 被引量:5
  • 4DEBASISH Jena, SAROJ Kumar Panigrahy. A Novel Protocol for Smart Card Using ECDLP [ J ]. IEEE Transactions on Consumer Electronics,2008:838-843.
  • 5ZHU Can-yan, ZHANG Li-hua. Security Analysis of a Remote User Authentication Scheme Using Smart Card [ J ]. IEEE Int Conference Neural Networks & Signal Processing , 2008 : 133-155.
  • 6邱慧敏,杨义先,胡正名.一种基于椭圆曲线密码机制的用户认证方案设计[J].计算机工程与应用,2005,41(3):28-30. 被引量:8

二级参考文献19

  • 1L Lamport.Password authentication with insecure communication[J].Comm of the ACM,1981;24(11):770~772.
  • 2M S Hwang,L H Li Wu.A new remote user authentication with smart card[J].IEEE trans on consumer electron,2000;46(1):28~30.
  • 3C K Chan,L M Cheng. Cryptanalysis of a remote user authenticationscheme using smart cards[J].IEEE trans on consumer electron,2000;46(4) :992~993.
  • 4C C Chang,K F Hwang. Some forgery attacks on a remote user authentication scheme using smart cards[J].Informatics,2003;14(3):289~294.
  • 5J J Shen,C W Lin,M S Hwang. A modified remote user authentication scheme using smartcards[J].IEEE trans onconsumer Electron,2003;49(2):414~416.
  • 6K-C Leung,L M Cheng,A S Fong et al. Cryptanalysis of a modified remote user authentication scheme using smart cards[J].IEEE trans on Consumer Electron,2003;49(4):1243~1245.
  • 7Amit K Awasthi,Sunder Lal.An Enhanced Remote User Authentication Scheme Using Smart Cards[J].IEEE trans on Consumer Electron,2004;50(2) :583~586.
  • 8LenStra,E R Verheul. Selecting cryptographic key sizes[C].In:the 3rd workshop on ECC ,waterloo ,cananda, 1999-11.
  • 9Noblitz N.Elliptic curve cryptosystems[J].Math of Comput, 1987;(48):203~209.
  • 10ElGamal T.A public key cryptosystem and a signature scheme based on discrete logarithms[J].IEEE Trans on info Theory,1985;31(4):469~472.

共引文献11

同被引文献10

  • 1ZHENG Y L. Digital Signcryption or How to Achieve Cost (Signature Encryption) << Cost (Signature) + Cost(En- cryption) [C] //Advances in Cryptology-Crypto'97, LNCS 1294. Berlin: Springer-Verlag, 1997 : 165- 179.
  • 2RIVEST R L, SHAMIR A, TAUMAN Y. How to Leak a Secret[C] //Advances in Cryptology-Asiacrypt 2001, LNCS 2248. Berlin: Springer-Verlag, 2001: 552-565.
  • 3LIU J K, WEI V K, WONG D S. Linkable Spontaneous Anonymous Group Signature for Ad-Hoc Groups (Extended Abstract) [C] //ACISP'04, LNCS 3108. Berlin: Springer-Verlag, 2004: 325-335.
  • 4MAO H A, CHOW S M, SUSILO W, et al. Short Linkable Ring Signatures Revisited [C] //EuroPKI 2006, LNCS 4043. Berlin: Springer-Verlag, 2006: 101-115.
  • 5HERRANZ J, SAEZ G. Forking Lemmas for Ring Signature Schemes [C] //INDOCRYPT 2003, LNCS 2904. Springer-Verlag, 2003: 266-279.
  • 6BAO F, DENG R H. A Signcryption Scheme with Signature Directly Verifiable by Public Key [C] // PKC'98, LNCS 1431. Springer-Verlag, 1998: 55-59.
  • 7GAMAGE C, LEIWO J, ZHENG Y. Encrypted Message Authentication by Firewalls[C] // PKC'99, LNCS 1560. Berlin: Springer-Verlag, 1999: 69-81.
  • 8ZHENG Y L, IMAI H. How to Construct Efficient Signcryption Schemes on Elliptic Curves [J]. Information Processing Letters, 1998, 68(5): 227-233.
  • 9JUNG H Y, LEE D H, LIM J I, et al. Signcryption Schemes with Forward Secrecy [C] //The Second Workshop Information Security Application (WISA 2001). Berlin.. Springer-Verlag, 2001: 463-475.
  • 10瞿云云,陈云坤,曹祖平,曹慧.扩展汉明码信息协调协议[J].西南大学学报(自然科学版),2011,33(3):114-117. 被引量:3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部