期刊文献+

大容量存储设备身份认证与数据保护方案研究 被引量:5

An Authentication and Data Protection Scheme Research for Mass Storage Devices
下载PDF
导出
摘要 通用串行总线大容量存储器是一种被广大用户广泛使用的存储设备。为了保护USB存储设备中用户数据安全,提出了一种适用于USB大容量存储器有效的身份认证与数据保护方案。利用属性权限控制技术,实现了对USB设备用户的安全认证、实现了对USB设备中隐私数据细粒度控制。安全性分析表明该方案具有较强的安全性,能够抵抗重放攻击、拒绝服务攻击、在线口令猜测攻击、用户伪装攻击等;实验性能分析表明该方案在用户注册、认证、文件解密等方面具有较高的效率。 Universal serial bus mass storage is a widely used storage device.In order to protect the user data security in USB storage devices,an effective authentication and data protection scheme is proposed.Using the attribute-based control technology,the security authentication of the USB device user is realized,and the privacy data fine-grained control of the USB device is realized.Security analysis shows that the scheme has strong security,it can resist replay attack,denial of service attack,the online password guessing attack,user impersonation attack,etc.Experimental performance analysis shows that the scheme has high efficiency in user registration,authentication and file decryption.
作者 韩刚 李辉 Han Gang;Li Hui(School of Electronics and Information,Northwestern Polytechnical University,Xi′an 710072,China)
出处 《西北工业大学学报》 EI CAS CSCD 北大核心 2018年第3期550-557,共8页 Journal of Northwestern Polytechnical University
基金 国家自然科学基金(61571364) 陕西省自然科学基金(2017JM6037) 西北工业大学研究生创意创新种子基金(Z2017022)资助
关键词 大容量存储器 属性基权限控制 细粒度控制 实验设计 可靠性分析 universal serial bus mass storage attribute-based control technology fine-grained control design of experiments,reliability analysis
  • 相关文献

参考文献1

二级参考文献14

  • 1Lamport L. Password authentication with insecure communieation [ J ]. Commun ACM, 1981,24 ( 11 ) :770 - 772.
  • 2Jablan D P. Strong password - only authenticated key exchange [ J ]. Computer Communication Review, 1996,26 (5):5-26.
  • 3Wu T C,Sung H S. Authenticating passwords over an insecure channel [ J]. Computers and Security, 1996, 15 (5) :431 -439.
  • 4Dodis Y, Reyzin L, Smith A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data [ C ]//Cachin, J. camenisch. 23rd Annual Eurocrypt Con- ference. Interlaken, SWITZERLAND. [ S. 1. ] : [ s. n. ], 2004:523 - 540.
  • 5Dodis Y, Ostrovsky R, Reyzin L. Fuzzy extractors : How to generate strong keys from biometrics and other noisy data [J]. Siam Journal on Computing,2008,38( 1 ) :97 - 139.
  • 6Yao A C. THEORY AND APPLICATIONS OF TRAP- DOOR FUNCTIONS [ C]//23rd Annual Symposium on Foundations of Computer Science. Chicago : IEEE, 2003 : 80 -91.
  • 7Nisan N,Zuckerman D. Randomness is linear in space [ J]. Journal of Computer and System Sciences, 1996,52 (1) :43 -52.
  • 8Boyen X, Dodis Y, Katz J. Secure remote authentication using biometric data [ J ]. Advances in Cryptology, 2005, 3494 : 147 - 163.
  • 9Dodis Y, Katz J, Reyzin L. Robust fuzzy extractors and authenticated key agreement from close secrets [ C ]// 26th Annual International Cryptology Conference. CRYPTO 2006, August 20,2006 - August 24,2006. Seattle, WA, United states. [ S. l. ] : Springer Verlag, 2006 : 232 - 250.
  • 10Cramer R, Dodis Y, Fehr S. Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors [ C ]//27th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Istanbul : Springer Verlag ,2007:471 - 488.

共引文献1

同被引文献43

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部