期刊文献+

基于身份的多服务器认证密钥协商方案 被引量:1

Identity-based smart card remote authenticated key agreement protocol for multi-servers
原文传递
导出
摘要 将基于身份的密码体制与远程多服务器密钥协商相结合,提出一种基于身份的远程多服务器密钥协商方案.用户注册时由私钥生成中心颁发私钥并安全存放于智能卡中.用户登录服务器前,双方采用基于身份的双线性配对计算进行双向身份认证,并协商生成会话密钥.服务器端无须保存口令表,用户端无须建立数据表存储相关登录信息,无须在终端能离线更改登录口令.该方案减少了密钥协商的通信开销、计算开销以及存储开销,在标准BR安全模型下该方案被证明是安全的. An efficient remote authenticated key agreement scheme with multi-servers using identity-based cryptography was proposed.The private key issued by the key generation center stores in the smart card security.The mutual authentication based bilinear will be achieved as well as a session key generation before user′s login.In the scheme neither servers nor users preserve the password table.Users do not need register to multi-servers when they login a new server.The proposed scheme provides the explicit key authentication between users and servers.Furthermore,it reduces the communication costs,computation and storage consuming.Additionally,the scheme has been proved secure by the standard BR security model of authenticated key agreement protocols.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2011年第1期36-40,共5页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(60773035) 四川省教育厅青年基金资助项目(10ZB082) 西华大学校重点科研基金资助项目(Z1022615)
关键词 公钥密码 基于身份的密码体制 认证密钥协商 远程多服务器 BR安全模型 public cryptography identity-based cryptography authenticated key agreement remote multi-servers BR security model
  • 相关文献

参考文献12

  • 1Juang W S. Efficient multi-server password authenticated key agreement using smart cards[J]~. IEEE Transactions on Consumer Electronics, 2004, 50 (1) : 251-255.
  • 2Li L H, Lin I C, Hwang M S. A remote password authentication scheme for multi-server architecture u- sing neural networks[J]. IEEE Transactions on Neural Networks, 2001, 12(6): 1498 1504.
  • 3Ryan P, Hao F. Password authenticated key ex change by juggling[C]// Proceeding of 16th Work shop on Security Protocols. Berlin: Springer-Verlag 2008:198 210.
  • 4Ku W C. Weaknesses and drawbacks of a password authentication scheme using neural networks for mul- tiserver arehiteeture[J]. IEEE Transactions on Neural Networks, 2005, 16(4): 1002-1005.
  • 5Hsiang H C, Shih W K. Inprovement of the secure dynamic ID based remote user authentication scheme for multi-server environment[J]. Computer Standards & Interfaces, 2009, 31(1): 1118-1123.
  • 6Tsaur W J, Wu C C, Lee W B. A smart card-based remote scheme for password authentication in multi- server Internet services[J]. Computer Standards Interfaces, 2004, 27(1):39-51.
  • 7TsaurWJ, WuCC, LeeWB. An enhanced user authentication scheme for multi-server Internet services [J]. Applied Mathematics and Computation, 2005, 170(1): 258-266.
  • 8Chang C C, Kuo J Y. An efficient multi-server password AKA scheme using smart cards with access control[C]//Proceeding of 19th International Conference on Advanced Information Networking and Appli- cations. Taipei: IEEE Computer Society, 2005: 257- 260.
  • 9张凡,冯登国.基于模糊提取的远程双向生物认证[J].计算机研究与发展,2009,46(5):850-856. 被引量:9
  • 10李曦,胡汉平,王一,王茂才.基于身份tate配对的移动支付手机终端[J].华中科技大学学报(自然科学版),2008,36(11):28-31. 被引量:3

二级参考文献28

  • 1胡汉平,李曦,王祖喜,等.实现电子支付的方法、系统及移动终端:中国,200710090259.X[P].2007-09-12.
  • 2GSM Association. GSM[EB/OL]. [2004-9-1]. http:///www. gsmworld. com/technology.
  • 3Shamir A. Identity-based cryptosystems and signature schemes [C] // Advances in Cryptology-Cryptor 84, LNCS 196. [s. l.]: Springer-Verlag, 1984: 47- 53.
  • 4Sakai R, Ohgishi K, Kasahara M. Cryptosystems based on pairing [C] // Symposium, on Cryptography and Information Securit. Berlin: Springer-Verlag, 2000 : 26-28.
  • 5Boneh D, Franklin M. Identity-based Encryption from the Weil pairing[J]. SIAM J of Computing, 2003, 32(3): 586-615.
  • 6Paterson K G. ID-based signatures from pairings on elliptic curves[J]. Electronic Letters, 2002, 38(18): 1 025-1 026.
  • 7Hess F. Efficient identity based signature schemes based on pairings[C]//Selected Areas in Cryptography-SAC, LNCS 2595. Berlin: Springer-Verlag, 2003 : 310-324.
  • 8Galbraith S D, Keith Harrison, David Soldera. Implementing the rate pairing, algorithmic number theory[C] // 5th International Symposium, LNCS 2369. Berlin:Springer-Verlag, 2002: 324-337.
  • 9Yi X. An identity-based signature scheme from the weil pairing [ J ]. IEEE Communications Letters, 2003: 7(2), 76-78.
  • 10SECPay Ltd, 3-D Secure integration and user guide [EB/OL]. [2006-6-18]. http://www. secpay. com/ secpay/index. php/secpay/content/download/982/ 6992/file/3-D% 20Secure% 20Integration % 20and% 20User%20Guide. pdf.

共引文献10

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部