期刊文献+

高效的基于口令多服务器认证方案 被引量:2

Efficient password-based multi-server authentication scheme
下载PDF
导出
摘要 如果一个远程用户想要从不同的服务器获得网络服务,则必须分别向这些服务器提交注册信息。为解决这个问题,研究者提出了多服务器认证方案。然而大部分多服务器认证方案不能抵抗某些密码攻击或者计算复杂度太高。提出一种高效、安全的多服务器认证与密钥协商协议。由于智能卡和读卡器使得实现这类方案的成本较高,新方案没有使用智能卡。与相关的多服务器认证方案相比,新方案同时具有高效性和安全性,因而更适合在实际环境中应用。 If a remote user wishes to access network services from different servers, he or she has to register with these servers separately. In order to resolve this issue, multi-server authentication scheme had been proposed. However, almost all these schemes were insecure against some cryptographic attack or suffered from high computation costs. This paper proposed an efficient and secure multi-server authentication with key agreement scheme. It eliminated the use of smart card, since smart card and card reads made these schemes costly. Compared with related multi-server authentication schemes, the proposed scheme achieved strong security and enhanced computational efficiency, thus is more suitable for the practical applications.
作者 舒剑
出处 《计算机应用研究》 CSCD 北大核心 2015年第8期2444-2446,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(61163053)
关键词 认证 单服务器 多服务器 密钥协商 密码攻击 authentication single server multi-server key agreement cryptographic attack
  • 相关文献

参考文献2

二级参考文献36

  • 1刘亮,刘云,宁红宙.公钥体系中Chebyshev多项式的改进[J].北京交通大学学报,2005,29(5):56-59. 被引量:11
  • 2KOCAREV L,TASEV Z. Public-key eneryption based on Chebyshev maps[ C ]//Proc of IEEE Symposium on Circuits and Systems. 2003 : 28-31.
  • 3BERGAMO P, D' ARCO P, SANTIS A, et al. Security of public key cryptosystems based on Chebyshev polynomials [ J ]. IEEE Trans on Circuits and Systems-I: Regular Papers, 2005,52 ( 7 ) : 1382- 1393.
  • 4XIAO Di, LIAO Xiao-feng, DENG Shao-jiang. A novel key agreement protocol based on chaotic maps [ J]. Information Science,2007,177 (3) :1136-1142.
  • 5HANS. Security of a key agreement protocol based on chaotic maps [ J 1- Chaos, Solitons, and Fractals ,2008,38 ( 3 ) :764-768.
  • 6XIANG Tao, WONG K W, LIAO Xiao-feng. On the security of a novel key agreement protocol based on chaotic maps [ J ]. Chaos, Solitons, and Fractals,2009,40(2) :672-675.
  • 7WANG Da-hu, HU Zhi-guo,TONG Zao-jing,et al. An identity authen- tication system based on Chebyshev polynomials[ C]//Proc of the 1 st International Conference on Information Science and Engineering.2009:26-28.
  • 8ZHAO Geng, LU Fang-fang. Security of several public key algorithms chaos-based proposed recently[ C ]//Proc of International Conference on Communication. [ S. l ] : IEEE Press,2006 : 1573 -l 576.
  • 9KOCAREV L, MAKRADULI J, AMATO P. Public-key encryption based on Chebyshev polynomials[ J ]. Circuits, Systems, and Signal Processing, 2005,24 ( 5 ) :497 - 517.
  • 10WANG Xing-yuan,ZHAO Jian-feng. An improved key agreement protocol based on chaos [ J]. Communications in Nonlinear Science and Numerical Simulation ,2010,15(12) :4052-4057.

共引文献12

同被引文献14

  • 1C H Huang, J S Chou, Y Chen. Improved multi-serv- er authentication protocol[J]. International journal of Security and Communication Networks, 2012, 5 (3) : 331 - 341.
  • 2X Li, Y Xiong, J Ma, et al. An efficient and secu-rity dynamic identity Based authentication protocol for multi-server architecture using smart cards[J]. Journal of Network and Computer Applications, 2012,35 (2: 763 - 769.
  • 3J S, Chou Y 1, Chen, C H Huang, et al. Comm-ents on four multi-server authentication protocols using smart card[EB/OL]. [2016-04-20]. http://eprint, ia- cr. org/2012/406, pdf.
  • 4J H Lee, D H Lee. Efficient and secure remote au- thenticated key agreement scheme for multi-server u- sing mobile equipment[C]/// Proceedings of Interna- tional Conference on Consumer Electronics. Las Vegas, NV: IEEE, 2008 : 1-2.
  • 5Y M Tseng, T Y Wu, J D Wu. A pairing-based user authentication scheme for wireless clients with smart card[J]. Informatics, 2008,19 (2) :285-302.
  • 6K H Yeh, N W Lo. A novel remote user authentica- tion scheme for multi-server environment without u- sing smart cards [J]. International Journal of Innova- tive Com-puting Information and Control, 2010, 6(8) : 3467-3478.
  • 7张晓敏.基于二次剩余的多服务器环境下的身份认证协议[J].计算机安全,2012(8):16-18. 被引量:1
  • 8万涛,廖维川,马建峰.面向多服务器架构的认证协议分析与改进[J].西安电子科技大学学报,2013,40(6):174-179. 被引量:8
  • 9舒剑.多服务器环境下基于扩展混沌映射的认证密钥协商协议[J].计算机应用研究,2016,33(1):232-235. 被引量:1
  • 10李艳平,刘小雪,屈娟,鲁来凤.基于智能卡的多服务器远程匿名认证密钥协商协议[J].四川大学学报(工程科学版),2016,48(1):91-98. 被引量:7

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部