期刊文献+

基于双线性对和智能卡的远程用户认证方案 被引量:3

A Remote User Authentication Scheme Based on Bilinear Pairings and Smart Card
下载PDF
导出
摘要 文章提出了一种使用双线性对和智能卡的远程用户认证方案.在方案中,如果登录请求为有效时,则远程系统接受请求,并允许用户登入系统.该方案利用了椭圆曲线上离散对数的困难性,使得计算成本更低,安全性更高.另外,该方案主要在注册阶段和登录阶段加强了安全性,能够抵御重放攻击、内部攻击、假冒服务器攻击,同时提供了灵活的密码修改方式,并实现了双向认证. The paper presened a remote user authentication scheme based on bilinear pairings and smart card. In this scheme, the remote system receives user login request and allows login to the remote system if the login request is valid. This scheme uses elliptic curve discrete logarithm problem to lower the computation cost and highten the security. In addition, the scheme enhances the security in registration phase and login phase. The scheme can withstand replay attack, forgery attack and insider attack. The password can be changed by the user at any time. The scheme achieves mutual authentication.
出处 《杭州师范大学学报(自然科学版)》 CAS 2011年第5期403-406,共4页 Journal of Hangzhou Normal University(Natural Science Edition)
基金 浙江省自然科学基金项目(Y6110782) 浙江省教育厅科研基金项目(Y201016497) 杭州市高校重点实验室科技创新项目(20100331T11) 杭州师范大学科研项目(2010QN26)
关键词 认证方案 智能卡 双线性对 远程用户 双向认证 authentication scheme smart card bilinear pairings remote user mutual authentication
  • 相关文献

参考文献11

  • 1Lmmport L. Password authentication with insecure communication[J]. Communication of the ACM,1981,24(11):770-772.
  • 2Hwang M S,Li Hua. A newremote user authentication scheme using smart cards[J]. IEEE TransConsumer Electronic,2000,46(1): 28- 30.
  • 3Shen J J, Lin C W, Hwang M S. A modified remote user authentication scheme using smart cards[J]. IEEE Trans Consumer Electron- ic,2003,,19(2):414 -416.
  • 4Chang C C, H wang K F. Some forgery attack on a remote user authentication scheme using smart cards[J]. Informatics,2003,14(3): 289-294.
  • 5SHEN Zhong-hua.A new modified remote user authentication scheme using smart cards[J].Applied Mathematics(A Journal of Chinese Universities),2008,23(3):371-376. 被引量:4
  • 6沈忠华,于秀源.一个新的智能卡远程用户认证方案[J].浙江大学学报(理学版),2008,35(2):145-149. 被引量:3
  • 7于秀源.复合加密的公钥密码系统[M]//密码学进展.北京:科学出版社,1992:55-58.
  • 8Das M, Saxena A, Gulati V, et al. A novel remote user authentication scheme using bilinear pairings[J]. Computers & Security,2006, 25(3): 184-189.
  • 9Chou J S Y. Chen, Lin J Y. Improvement of Das et al.'s remote user authentication scheme [EB/OL]. (2005 -12-05)[2011 -01-20]. ht- tp; //eprint. iacr. org/2005/450, pdf.
  • 10Goriparthi T, Das M L, Negi A, et al. Cryptanalysis of recently proposed remote user authentication schemes[EB/OL]. (2006 -03-06) [2010- 10- 25]. http://eprint, iacr. org/2006/028, pdf.

二级参考文献28

  • 1沈忠华,于秀源.一个安全有效的电子支付系统[J].计算机工程与应用,2006,42(7):200-201. 被引量:3
  • 2沈忠华,于秀源.一个安全有效的有向门限签名方案[J].浙江大学学报(理学版),2006,33(4):393-395. 被引量:5
  • 3于秀源.复合加密的公钥密码系统[C]//密码学进展-CHINACRYPTO’92,北京:科学出版社,1992.55-58.
  • 4LEE C C, HWANG M S, YANG W P. A flexible remote user authentication scheme using smart cards[J]. ACM Operating Systems Review, 2002,36(3) :46-52.
  • 5CHIEN H Y, JAN J K, TSENG Y M. An efficient and practical solution to remote authentication: smart card[J]. Computer & Security, 2002, 21 (4): 372- 375.
  • 6LI L H, LIN I C, HWANG M S. A remote password authentication scheme for multi-server architecture using neural networks [J]. IEEE Trans Neural Networks, 2001,12(6) : 1498-1504.
  • 7UDI M. A simple scheme to make passwords based on the one-way function much harder to crack[J]. Computer and Security, 1996,15(2):171-176.
  • 8WU T C. Remote login authentication scheme based on a geometric approach[J]. Computer Communication, 1995,18(12):959-963.
  • 9MITCHELL C J, CHEN I. Comments on the S/ KEY user authentication scheme[J]. ACM Operating System Review, 1996,30(4) : 12-16.
  • 10LENNON R E, MATYAS S M, MAYER C H. Cryptographic authentication of time-variant quantities[J]. IEEE Trans On Commune, 1981,29(6) : 773- 777.

共引文献7

同被引文献11

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部