期刊文献+

基于智能卡的多服务器环境下的远端认证协议 被引量:2

Remote authentication protocol for multi-servers based on smart card
下载PDF
导出
摘要 多服务器环境下的远端认证协议需要实现用户只需要一次注册即可与多个服务器实现交互的目标。基于椭圆曲线密码学提出一个注册中心离线的多服务器环境下的远端认证协议。该协议中的注册中心无须维护口令列表,不参与认证过程。用户使用动态身份信息,其他服务器认可接入服务器的认证结果,仍能实现服务器之间的身份区分。协议无须公钥加密等复杂运算,能够实现正确的认证、会话密钥的安全属性并能抵抗伪造攻击、重放攻击、中间人攻击和服务器模仿攻击等攻击。 Remote authentication protocol for multi-servers aimed at realizing authentication with multi-server respectively by registering with register only once. This paper proposed a remote authentication protocol for multi-servers based on elliptic curve cryptography. In the protocol,it was no need for RC to maintain the password table and take part in the authentication phase. The identity of users were dynamically changed,which protected the privacy of the users. Different servers could be distinguished,and they all acceped the authentication result. The protocol not only realizes authentication without public key encryption,but also resists impersonation attack,replay attack,man in the middle attack and other attacks.
作者 张青
出处 《计算机应用研究》 CSCD 北大核心 2014年第7期2109-2111,2115,共4页 Application Research of Computers
基金 陕西省科技厅自然科学基础研究计划项目(2010JM2016)
关键词 认证 多服务器 智能卡 动态身份 authentication multi-server smart card dynamic identity
  • 相关文献

参考文献15

  • 1LI L, LIN L, HWANG M. A remote password authentication scheme for muhi-server architecture using neural networks [ J]. JEEE Trans on Neural Networks,2001,12 (6) : 1498- 1504.
  • 2JUANG W. Efficient multi-server password authenticated key agree- ment using smart cards[ J]. IEEE Trans on Consumer Electroni- cs ,2004,50( 1 ) :251-255.
  • 3CHANG C C, LEE J S. An efficient and secure multi-server password authentication scheme using smart cards [ C ]//Proc of the 3rd Interna- tional Conference on Cyberworlds. 2004:417-422.
  • 4TSAUR W, WU C, LEE W. A smart card-based remote scheme for password authentication in multi-server Internet services [ J ]. Com- puter Standards & Interfaces,2004,27( 1 ) :39-51.
  • 5TSAI J. Efficient multi-server authentication scheme based on one- way hash function without verification table[ J]. Computers & Secu- rity,2008,27(3-4) :115-121.
  • 6LIAO Y, WANG S. A secure dynamic ID based remote user authenti- cation scheme for multi-server environment [ J ]. Computer Stan- dards & Interfaces,2009,31 (1) :24-29.
  • 7HSIANG H, SHIH W. Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment [ J ]. Computer Standards & Interfaces,2009,31 (6) : 1118- 1123.
  • 8SOOD S K, SARJE A K, SINGH K. A secure dynamic identity based authentication protocol for multi-server architecture [ J ]. Journal of Network and Computer Applications,2011,34 ( 2 ) :609- 618.
  • 9LEE C, LIN T, CHANG R. A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards r J]. Expert Systems with Applications, 2011,38 ( 11 ) : 13863- 13870.
  • 10杨力,马建峰.可信的智能卡口令双向认证方案[J].电子科技大学学报,2011,40(1):128-133. 被引量:16

二级参考文献19

  • 1王猛,卢建朱,李晓峰.基于智能卡的远程口令认证方案[J].计算机应用,2005,25(10):2289-2290. 被引量:6
  • 2张焕国,罗捷,金刚,朱智强,余发江,严飞.可信计算研究进展[J].武汉大学学报(理学版),2006,52(5):513-518. 被引量:114
  • 3SHEN ChangXiang,ZHANG HuangGuo,FENG DengGuo,CAO ZhenFu,HUANG JiWu.Survey of information security[J].Science in China(Series F),2007,50(3):273-298. 被引量:39
  • 4Lamport L. Password authentication with insecure communication [ J ]. Communications of the ACM, 1981,24( 11 ) :770-772.
  • 5Xu J, Zhu W T, Feng D G. An improved smart card based password au- thentication scheme with provable security [ J ]. Computer Standards and Interfaces,2009,31 (4) : 723 - 728.
  • 6Song R. Advanced smart card based password authentication protocol [ J]. Computer Standards and Interfaces,2010,32:321 - 325.
  • 7Trusted Computing Group. TPM Main Part 1 design principles specification version 1.2 [EB/OL]. http://www. trustedcom- putinggroup. org, 2012.
  • 8Stumpf F, Fuchs A, Katzenbeisser S, et al. Improving the scalability of platform attestation [C]. New York, NY, USA: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008: 1-10.
  • 9Korthaus R, Sadeghi A R, Stuble C. A practical property-based bootstrap architecture [C]. New York, NY, USA: Proceedings of the ACM Workshop on Scalable Trusted Computing, 2009: 29-38.
  • 10Davi L, Sadeghi A R, Winandy M. Dynamic integrity measurement and attestation: Towards defense against return-oriented programming attacks [C]. Proceedings of STC, Asokan N, Nita-Rotaru C, Seifert J-P, 2009: 49-54.

共引文献17

同被引文献27

  • 1Vaidya B, Makrakis D, Mouftah H T. Improved two-factor user authentication in wireless sensor networks. Proceedings of IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications(WiMob), Shenzhen, China, 2010:600-606.
  • 2Mnif A, Cheikhrouhou O, Jemaa M B. An ID-based user authentication scheme for wireless sensor networks using ECC. Proceedings of 2011 International Conference on Microelectronics (ICM), Nanjing, China, 2011:1-9.
  • 3Huang X, Dharmendra S, Cui H Y. Fuzzy controlling window for elliptic curve cryptography in wireless sensor networks. Proceedings of the International Conference on Information Networking 2014 (ICOIN2014), Xiamen, China, 2014:312-317.
  • 4Faye Y, Guyennet H, Niang I, et ol. Fast scalar multiplication on elliptic curve cryptography in selected intervals suitable for wireless sensor networks. Lecture Notes in Computer Science, 2013(1):171-182.
  • 5Xue K, Ma C, Hong P, eta/. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network & Computer App|ications, 2013, 36(1):316-323.
  • 6Pippal R S, Gupta P, Singh R. A novel smart card authentication scheme using image encryption. International Journal of Computer Applications, 2013, 72(9):8-14.
  • 7Wei J H, Liu W F, Hu X X. Cryptanalysis and improvement of a robust smart card authentication scheme for multi-server architecture. Wireless Personal Communications, 2014, 77 (3): 2255 -2269.
  • 8Li X, Niu J W, Kumari S, et ol. An enhancement of a smart card authentication scheme for muhi-server architecture. Wireless Personal Communications, 2015, 80(1):175-192.
  • 9PIPPAL R S,JAIDHAR C D,TAPASWI S.Comments on symmetric key encryption based smart card authentication scheme[C]//Proceedings of the 2nd International Conference on Computer Technology and Development.Cario:IEEE,2010:482-484.
  • 10SORAM R,CHATTERJEE R,ROY D P,et al.A remote smart card authentication protocol using elliptic curves[J].International journal of computer science&information technologies,2012,29(3):3856-3866.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部