期刊文献+

增强型相互认证密钥协商方案

Enhanced Mutual Authentication Key Agreement Scheme
下载PDF
导出
摘要 传统用于保护用户密钥隐私的相互认证方案不能有效抵抗重放攻击与DOS攻击。为此,将安全单向哈希函数和椭圆曲线上的离散对数难问题相结合,提出一种基于智能卡的相互认证方案。该方案通过引入时间戳及时延限制,能有效抵抗重放攻击,并减轻DOS攻击。相比于其他同类方案,该方案的移动用户端减少2次点的加法运算,提高用户端的计算效率。分析结果表明,该方案是安全有效的。 An authentication and key agreement scheme,which suffers from the replay attacks and dos attacks,preserving the privacy of secret key is proposed.For improving their scheme to ensure robust security for the mutual authentication process,it proposes an efficient authentication scheme using smart cards,which is based on elliptic curve discrete logarithm problem and a secure one-way hash function.It defends replay attack and mitigates do attack that could be launched against other related previous schemes because it is timestamp-based,and requires less computational cost.The analysis result shows this scheme is secure and efficient.
出处 《计算机工程》 CAS CSCD 2012年第1期108-110,共3页 Computer Engineering
基金 广东省产学研基金资助项目(2008B09050020 2009B010800023)
关键词 相互认证 密钥协商 智能卡 时间戳 mutual authentication key agreement smart card timestamp
  • 相关文献

参考文献6

  • 1Chien Hung-Yu, Jan Jinn-Ke, Tseng Yuh-Min. An Efficient and Practical Solution to Remote Authentication Smart Card[J]. Computers & Security, 2002, 21(4): 372-375.
  • 2Ku Weichi, Chen Shuaimin. Weaknesses and Improvements of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards[J]. IEEE Trans. on Consumer Electronics, 2004 50(1): 204-207.
  • 3Wang Xiaomin, Zhang Wenfang, Zhang Jiashu, et al. Cryptanalysis and Improvement on Two Efficient Remote User Authentication Scheme Using Smart Cards[J]. Computer Standards & Interfaces, 2007, 29(5): 507-512.
  • 4Wang Ren-Chiun, Juang Wen-Shenq, Lei Chin-Laung. Robust Authentication and Key Agreement Scheme Preserving the Privacy of Secret Key[J]. Computer Communications, 2011, 34(3): 274- 280.
  • 5Wang Yanyan, Liu Jiayong, Xiao Fangxia, et al. A More Efficient and Secure Dynamic ID-based Remote User Authentication Scheme[J]. Computer Communications, 2009, 32(4): 583-585.
  • 6曹爱霞,赵一鸣.Ad Hoc网络中基于身份的认证密钥交换协议[J].计算机工程,2007,33(10):150-152. 被引量:3

二级参考文献3

  • 1Eun K R,Eun J Y,Kee Y Y.An Efficient ID-based Authenticated Key Agreement Protocol from Pairings[C]//Proceedings of the 3rd International IFPS-TC6 Networking Conference.2004.
  • 2Khalili A,Katz J,Arbaugh W A.Toward Secure Key Distribution in Truly Ad-hoc Networks[C]//Proceedings of Applications and the Internet Workshops.2003.
  • 3Luo H,Lu S.Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks[R].Los Angeles:Dept.of Computer Science,University of California,Technical Report:TR-200030,2000.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部