期刊文献+

基于生物特征的匿名远程用户认证方案 被引量:3

Anonymous Remote User Authentication Scheme Based on Biological Features
下载PDF
导出
摘要 分析基于生物特征与二次剩余的远程用户认证方案,指出其存在不能抵抗冒充用户攻击、假冒服务器攻击、会话密钥泄露攻击和拒绝服务攻击等安全缺陷,基于此提出一个基于生物特征、口令与智能卡的匿名远程用户认证方案,主要包含注册、登录、认证和口令更新4个阶段。分析结果表明,该方案不仅克服了远程用户认证方案的安全缺陷,而且还可以抵抗智能卡丢失攻击、重放攻击,并实现了用户匿名性。 This paper analyzes a remote user authentication scheme based on biological features and quadratic residues, points out that the scheme is vulnerable to impersonation attack,server spoofing attack,session key disclosure attack and denial of service attack. To overcome these security flaws, the paper proposes a biological features based anonymous remote user authentication scheme with smart card, the scheme mainly includes register, login, authentication and password update. Analysis result shows that the proposed scheme not only solves the existing problems of previous scheme,but also can resist smart card lost attack,replay attack,and it implements user anonymity.
出处 《计算机工程》 CAS CSCD 北大核心 2015年第6期126-129,135,共5页 Computer Engineering
基金 国家自然科学基金资助项目(61173190) 重庆市教委科学技术研究基金资助项目(KJ1401009)
关键词 认证 智能卡 生物特征 口令 匿名性 authentication smart card biological feature password anonymity
  • 相关文献

参考文献13

二级参考文献66

  • 1杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 2冯登国,陈伟东.基于口令的安全协议的模块化设计与分析[J].中国科学(E辑),2007,37(2):223-237. 被引量:14
  • 3BELLARE M, ROGAWAY E Provably secure session key distribution-the three party case[A]. Proceedings of the 27th ACM Symposium on Theory of Computing[C]. Las Vegas: ACM, 1995.57-66.
  • 4CHANG C C, CHANG Y E A novel three-party encrypted key exchange protocol[J]. Computer Standards and Interfaces, 2004, 26(5): 471-476.
  • 5SUN H M, CHEN B C, HWANG T. Secure key agreement protocols for three-party against guessing attacks[J]. Journal of Systems and Software, 2005, 75(1-2): 63-68.
  • 6LEE S W, KIM H S, YOO K Y. Efficient verifier-based key agreement protocol for three parties without server's public key[J]. Applied Mathematics and Computation, 2005, 167(2): 996-1003.
  • 7ABDALLA M, CHEVASSUT O, FOUQUE P A, et al. A simple threshold authenticated key exchange from short secrets[A]. Proc. Asiacrypt'05[C]. Chennai, India, 2005. 566-584.
  • 8KWON J O, JEONG I R, SAKURAI K, et al. Efficient verifier-based password-authenticated key exchange in the three-party setting[J]. Computer Standards and Interfaces, 2007. 513-520.
  • 9LEE S W, KIM H S, YOO K Y. Improvement of Lee and Lee's authenticated key agreement scheme[J]. Applied Mathematics and Computation, 2005, 162(3): 1049-1053.
  • 10KWON J O, HWANG J Y, KIM C W, et al. Cryptanalysis of Lee-Kim-Yoo password- based key agreement scheme[J]. Applied Mathematics and Computation, 2005, 168(2): 858-865.

共引文献35

同被引文献18

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部