期刊文献+

新型基于Chebyshev多项式的身份认证方案 被引量:5

New identity authentication scheme based on Chebyshev polynomials
下载PDF
导出
摘要 对已有基于Chebyshev多项式的身份认证方案进行了安全性方面的分析,引入密态时钟,提出了一种新的身份认证方案。通过对其性能的研究,新的方案是安全有效的。 This paper studied the security of the proposed identity authentication scheme based on Chebyshev polynomials.It introduced the secret state clock,and proposed a new identity authentication scheme which was secure and practical after analyzing.
出处 《计算机应用研究》 CSCD 北大核心 2013年第6期1840-1842,1846,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(61170037)
关键词 CHEBYSHEV多项式 半群特性 密态时钟 身份认证 Chebyshev polynomials semi-group property secret state clock identity authentication
  • 相关文献

参考文献12

  • 1KOCAREV L,TASEV Z. Public-key eneryption based on Chebyshev maps[ C ]//Proc of IEEE Symposium on Circuits and Systems. 2003 : 28-31.
  • 2BERGAMO P, D' ARCO P, SANTIS A, et al. Security of public key cryptosystems based on Chebyshev polynomials [ J ]. IEEE Trans on Circuits and Systems-I: Regular Papers, 2005,52 ( 7 ) : 1382- 1393.
  • 3XIAO Di, LIAO Xiao-feng, DENG Shao-jiang. A novel key agreement protocol based on chaotic maps [ J]. Information Science,2007,177 (3) :1136-1142.
  • 4HANS. Security of a key agreement protocol based on chaotic maps [ J 1- Chaos, Solitons, and Fractals ,2008,38 ( 3 ) :764-768.
  • 5XIANG Tao, WONG K W, LIAO Xiao-feng. On the security of a novel key agreement protocol based on chaotic maps [ J ]. Chaos, Solitons, and Fractals,2009,40(2) :672-675.
  • 6WANG Da-hu, HU Zhi-guo,TONG Zao-jing,et al. An identity authen- tication system based on Chebyshev polynomials[ C]//Proc of the 1 st International Conference on Information Science and Engineering.2009:26-28.
  • 7ZHAO Geng, LU Fang-fang. Security of several public key algorithms chaos-based proposed recently[ C ]//Proc of International Conference on Communication. [ S. l ] : IEEE Press,2006 : 1573 -l 576.
  • 8刘亮,刘云,宁红宙.公钥体系中Chebyshev多项式的改进[J].北京交通大学学报,2005,29(5):56-59. 被引量:11
  • 9KOCAREV L, MAKRADULI J, AMATO P. Public-key encryption based on Chebyshev polynomials[ J ]. Circuits, Systems, and Signal Processing, 2005,24 ( 5 ) :497 - 517.
  • 10WANG Xing-yuan,ZHAO Jian-feng. An improved key agreement protocol based on chaos [ J]. Communications in Nonlinear Science and Numerical Simulation ,2010,15(12) :4052-4057.

二级参考文献21

  • 1王大虎,魏学业,柳艳红.Chebyshev多项式的公钥加密和身份认证方案的研究[J].北京交通大学学报,2005,29(5):40-42. 被引量:5
  • 2刘亮,刘云,宁红宙.公钥体系中Chebyshev多项式的改进[J].北京交通大学学报,2005,29(5):56-59. 被引量:11
  • 3王大虎,魏学业,李庆九,柳艳红.基于Chebyshev多项式的公钥加密和密钥交换方案的改进[J].铁道学报,2006,28(5):95-98. 被引量:3
  • 4Kocarev L, Makraduli J, Amato E Public-key Encryption Based on Chebyshev Maps[C]//Proceedings of the International Symposium on Circuits and Systems. [S. l.]: IEEE Press, 2003.
  • 5Kocarev L, Sterjev M, Fekete A, et al. Public-key Encryption with Chaos[J]. Chaos, 2004, 14(4): 1078-1082.
  • 6Bergamo P, D'Aroc P, De Santis A, et al. Security of Public Key Cryptosystems Based on Chebyshev Polynomials[C]//Proceedings of the International Symposium on Circuits and Systems. [S. l.]: IEEE Press, 2005,
  • 7Zhao Geng, Chen Guanrong, Lu Fangfang. Analysis of Some Recently Proposed Chaos-based Public Key Encryption Algorithms[C]//Proc. of 2006 International Conference on Communicationsl Circuits and Systems. [S. l.]: IEEE Press, 2006.
  • 8Kocarev L,Tasev Z.Public-key encryption based on Chebyshev maps[C]//Proc IEEE Symp Circ Syst (ISCAS'03),2003,3:28-31.
  • 9Bergamo P,D' Arco P,Santis A,et al.Security of public key cryptosystems based on Chebyshev polynomials[J].IEEE Trans Circ Syst-I,2005,52(7):1382-1393.
  • 10Wang Dahu,Hu Zhiguo,Tong Zaojing,et al.An Identity Authentication System Based on Chebyshev Polynomials[C]//The 1st Intemational Conference on Information Science and Engineering (ICISE 2009),Nanjing,2009,12:1648-1650.

共引文献13

同被引文献34

  • 1LAMPORT L. Password authentication with insecure communication [ J ]. Communications of the ACM, 1981,24 ( 11 ) :770-772.
  • 2SONG Rong-gong. Advanced smart card based password authentication protocol[ J]. Computer Standards & Interfaces, 2010,10 ( 5- 6 ) : 321-325.
  • 3DAS M L, SAXANA A, GULATI V P. A dynamic ID-based remote user authentication scheme[ J]. IEEE Trans on Consumer Elec- tronics,2004,50(2) :629-631.
  • 4AWASTHI A K. Comment on a dynamic ID-based remote user authen- tication scheme [ J ]. Trans on Cryptology ,2004,1 ( 2 ) : 15-16.
  • 5KU Wei-chi,CHANG Shen-tien. Impersonation attacks on a dynamic 1D-based remote user authentication scheme using smart cards [ J ]. IEICE Trans on Communications,2005, E88B(5 ) :2165-2167.
  • 6LIAO I E, LEE C C, HWANG M S. A password authentication scheme over insecure networks [ J]. Journal of Computer and System Sci- ences ,2006,72 (4) :727-740.
  • 7MISBAHUDDIN M,BINDU C S. Cryptanalysis of Liao-Lee-Hwang' s dynamic ID scheme [ J]. International Journal Network Security, 2008,6(2) :211-213.
  • 8WANG Yan-yan, LIU Jia-yong, XIAO Feng-xia, et al. A more efficient and secure dynamic ID-based remote user authentication scheme [ J]. Computer Communications ,2009,32 (4) :583- 585.
  • 9KHAN M K, KIM S K, ALGHATHBARI K. Cryptanalysis and security enhancement of a more efficient and secure dynamic ID-based remote user authentication scheme[ J]. Computer Communications, 2011, 34 ( 3 ) :305- 309.
  • 10WEN Feng-dong, LI Xue-lei. An improved dynamic ID-based remote user authentication scheme with key agreement scheme [ J ]. Comptl- ters and Electrical Engineering,2012,38(2) :381-387.

引证文献5

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部