期刊文献+

基于二次剩余的多服务器环境下的身份认证协议 被引量:1

Identity Authentication Protocol for Multi-servers Based on Quadratic Residues
下载PDF
导出
摘要 多服务器环境下的身份认证协议实现了用户只需要一次注册即可跟多个服务器实现交互认证,基于二次剩余构造了一个注册中心在线的多服务器环境下身份认证协议。该协议中,注册中心参与实现对用户的认证并协助用户和服务器建立后继通信的会话密钥,并且服务器之间是可以相互区分的。协议能够抵抗字典攻击、口令泄露模仿攻击常见攻击,同时能够实现相互认证,以及前向安全、已知会话密钥安全和无密钥控制等会话密钥的安全属性。 Identity authentication protocol for multi-servers aims at realizing authentication with multi-server respectively by registering with register only once.In this paper,based on quadratic residues,we proposed an identity authentication protocol for multi-servers.The honest but curious RC could not obtain the session key in the protocol.Authentication can be realized among participants.Compared with similar protocols,the protocol need lower communication cost and computation cost.Besides,the protocol could resist dictionary attacks,password compromised impersonation attack.At the same time,forward secrecy,no key control and known session key security can be realized.
作者 张晓敏
机构地区 陕西省行政学院
出处 《计算机安全》 2012年第8期16-18,29,共4页 Network & Computer Security
关键词 密钥协商 多服务器 口令 字典攻击 Key agreement Multi-Server Password Dictionary attack
  • 相关文献

参考文献10

  • 1Li L, Lin L, Hwang M. A remote password authentication scheme for multi server architecture using neural networks. IEEE Transactions on Neural Networks, 2001,12(6): 1498-1504.
  • 2Juang W. Efficient agreement Electronics using smart 2004, 50( multi server cards. IEEE ):251 255 password authenticated key Transaction on Consumer.
  • 3Chang C, Lee J. An efficient and secure multi server password authentication scheme using smart cards: In: Proceedings of .he shird in.ern&tJonsJ conference on cyberwoflds, 2004.
  • 4Ts&ur W, Wu C, Lee W. A sm&rt card b&sed remote scheme for p&ssword &uthentic&tion in multi server Internet services. Computer St&ndards & Interfaces, 2004, 27(I):39 51.
  • 5Tsai J one w.y Efficient multi-server authentic&tion scheme b&sed hash function without Security, 2008, 27(5 4): ;15 verification t&ble. Computers 121 . on &.
  • 6Li&o Y, W&ng S. A secuPe dyn&mic ID based Pemote useP authentic&tion scheme for multi-sePvep enviPonmenc. ComputeP St&nd&r'ds & Interf&ces, 2009, 51(1):24 29.
  • 7Hsiang H, Shih W. Improvement of %he secure dynamicD based remote user authentication scheme for multi server environment. Computer Standards & Interfaces, 2009, 51(6) 8 ;i25.
  • 8Seed S K, Sarje A K, Singh K. A secure dyn&mic identity b&sed &uthentic.tion protocol for multi server architecture. Journ&l of Network and Computer Applications, 20 1 1,3(2): 609-618.
  • 9Lee C, Lin T, Chang P.. A secure dynamic 113 b&sed remote user authentic&tion scheme for multi server environment using smart cards. Expert Systems with Applications, 2011,58(11):15865 15870.
  • 10Mao W., Modern cryptogr&phy: theory and practice. Prentice Hall PTR, 2004.

同被引文献9

  • 1C H Huang, J S Chou, Y Chen. Improved multi-serv- er authentication protocol[J]. International journal of Security and Communication Networks, 2012, 5 (3) : 331 - 341.
  • 2X Li, Y Xiong, J Ma, et al. An efficient and secu-rity dynamic identity Based authentication protocol for multi-server architecture using smart cards[J]. Journal of Network and Computer Applications, 2012,35 (2: 763 - 769.
  • 3J S, Chou Y 1, Chen, C H Huang, et al. Comm-ents on four multi-server authentication protocols using smart card[EB/OL]. [2016-04-20]. http://eprint, ia- cr. org/2012/406, pdf.
  • 4J H Lee, D H Lee. Efficient and secure remote au- thenticated key agreement scheme for multi-server u- sing mobile equipment[C]/// Proceedings of Interna- tional Conference on Consumer Electronics. Las Vegas, NV: IEEE, 2008 : 1-2.
  • 5Y M Tseng, T Y Wu, J D Wu. A pairing-based user authentication scheme for wireless clients with smart card[J]. Informatics, 2008,19 (2) :285-302.
  • 6K H Yeh, N W Lo. A novel remote user authentica- tion scheme for multi-server environment without u- sing smart cards [J]. International Journal of Innova- tive Com-puting Information and Control, 2010, 6(8) : 3467-3478.
  • 7万涛,廖维川,马建峰.面向多服务器架构的认证协议分析与改进[J].西安电子科技大学学报,2013,40(6):174-179. 被引量:8
  • 8舒剑.高效的基于口令多服务器认证方案[J].计算机应用研究,2015,32(8):2444-2446. 被引量:2
  • 9王崇霞,高美真,刘倩,周贤伟.异构云匿名身份认证方案设计[J].微电子学与计算机,2014,31(7):37-41. 被引量:2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部