期刊文献+

一种基于视觉密码的访问控制方案 被引量:1

An Access Control Scheme Based on Visual Cryptography
下载PDF
导出
摘要 利用视觉密码来构造一种新的访问控制方案,可以有效弥补传统访问控制方案的不足,从而使方案更可靠,更高效。视觉密码的安全性仅依赖于伪随机数的性能,不涉及到复杂的密码学算法,因此速度较快。方案中提出的访问控制协议分为注册和登录验证两步,易于实现。最后,分析了该方案对常见攻击的抵抗。 Based on the analysis of defect of traditional access control scheme,a new efficient and credible scheme which is structured by us ing visual cryptography is presented.The security of visual cryptography depends solely on the performance of pseudo random numbers,not involving complicated cryptographic algorithm,so it is very fast.The access control protocol which is presented in the scheme includes two steps,which are register and logging in validity,so it is easy to realize.Finally,the resist on common attack is analysized.
出处 《电脑知识与技术》 2012年第2X期1244-1246,共3页 Computer Knowledge and Technology
基金 国家自然科学基金项目(60573028)资助项目 湖南省教育厅科研项目(07C526)
关键词 访问控制 视觉密码 对称密码 智能密码钥匙 信息安全 Access control Visual cryptography symmetric cryptography intelligent cryptographic key information secutity
  • 相关文献

参考文献7

二级参考文献42

  • 1李少春,蒋泽军,王丽芳,张羽.J2EE环境下基于LDAP的访问控制的设计与集成[J].微电子学与计算机,2005,22(3):118-120. 被引量:9
  • 2赵保翠,刘岗.基于LDAP的统一用户管理系统的设计和实现[J].微电子学与计算机,2005,22(11):59-62. 被引量:8
  • 3李长河,甘文丽.基于LDAP和多Agent的分布式网络信息检索[J].计算机工程,2006,32(8):110-112. 被引量:6
  • 4[1]Chang C C, Wu T C. Remote Password Authenticated With Smart Card. IEE Proceedings-E,199 1, 138(3): 165-168
  • 5[2]Menkus B. Understanding the Use of Passwords. Computers and Security, 1988,(7):132-136
  • 6[3]Shamir A. Identity-based Cryptosystems and Signature Scheme. Proceedings CRYPTO84 ,Springer,Berlin, 1985:47-53
  • 7[4]Elgamal T. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory,1985,31(4):469-472
  • 8[5]Wang Shiuhjeng, Chang Jinfu. Smart Card Based Secure Password Authentication Scheme. Computers & Security. 1996,15(3):231-237
  • 9NAOR M,SHAMIR A.Visual Cryptography[J].Advances in Cryptology:Eurpocrypt'94.Springer-Verlag LNCS950,1995:1-12.
  • 10ATENISES G,BLUNDO C,DE SANTIS A,et al.Extended Schemes for Visual Cryptography[EB/OL].http://www.eccc.unitrier.de/eccc/,2006.

共引文献26

同被引文献6

  • 1ANDREAS KLEIN, MARKUS WESSLER. Extended visual cryp-tography schemes[J]. Information and Computation,2007 (205):716-732.
  • 2GIUSEPPE ATENIESE,CARLO BLUNDO, ALFREDO DE SAN-TIS, et al. Stinson,visual cryptography for general access struc-tures[J]. Information and Computation, 1996(2) . 86-106.
  • 3M NAOR, B PINKAS. Visual authentication and identification[J]. Springer-Verlag LNCS, 1997(1294):322-336.
  • 4WANG D S, ZHANG L,MA N, et al. Two secret sharingschemes based on Boolean operations [ J], Pattern Recognition,2007(40):2776-2785.
  • 5杜轶焜,严承华,冯剑川.基于视觉密码的物联网身份认证技术研究[J].信息网络安全,2012(1):26-28. 被引量:3
  • 6樊攀星,严承华,程晋.视觉密码在交互式身份认证中的应用研究[J].信息网络安全,2013(8):31-32. 被引量:2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部