期刊文献+

基于ECC点乘的多因子远程身份验证协议 被引量:3

Multiple-factor remote authentication based on ECC multiplication
下载PDF
导出
摘要 针对多服务器环境下的远程身份验证存在的安全性问题,提出基于椭圆曲线加密(ECC)的多因子远程用户身份验证协议。该协议所用的因子有密码、智能卡和生物统计信息。在登陆阶段,使用生物统计信息和密钥,将智能卡生成的时间戳信息作为一个依据发送到注册中心,保障基础数据的新鲜性;在身份验证阶段,检查时间戳信息和密钥等信息,由于攻击者无法检索这些基础信息,保障双向验证的顺利完成。BAN逻辑证明了所提协议能够提供安全准确的双向身份验证和会话密钥协商。安全性分析表明,与其它协议相比,所提协议可以抵御各种安全性威胁,总体计算成本较低。 Aiming at the security problem of remote authentication in the environment of multiple server,a multiple-factor remote user authentication protocol based on elliptic curve cryptography(ECC)was proposed.The factors used in this protocol were ciphers,smart cards,and biometric information.On the landing stage,by using the biometric information and the key,the time stamp information generated by the smart card were sent to the registration center as a basis,making the basic data fresh.In the authentication stage,the time stamp information and the key information were checked,and the two-way authentication was completed successfully,because the attacker could not retrieve these basic information.The BAN logic proves that the proposed protocol can provide secure and accurate two-way authentication and session key negotiation.Security analysis shows that compared with other protocols,the proposed protocol can resist many kinds of security threats,and the overall cost of computing is low.
作者 王超 刘黎明 WANG Chao;LIU Li-ming(School of Software,Nanyang Institute of Technology,Nanyang 473004,China)
出处 《计算机工程与设计》 北大核心 2018年第11期3368-3373,共6页 Computer Engineering and Design
基金 2017河南省科技攻关计划基金项目(172102210119)
关键词 多服务器环境 椭圆曲线加密 远程身份验证 时间戳 BAN逻辑 environment of multiple server elliptic curve cryptography remote authentication time stamp BAN logic
  • 相关文献

参考文献6

二级参考文献73

  • 1麻永新,曾晓洋,吴敏,孙承绶.基于Barrett模乘算法的RSA密码协处理器设计[J].系统工程与电子技术,2006,28(6):830-833. 被引量:1
  • 2张利华.基于随机数和Hash函数的认证方案[J].微电子学与计算机,2007,24(6):80-83. 被引量:7
  • 3Menezes A, van Oorschot P, Vanstone S. Handbook of Applied Cryptography[M]. New York, USA: CRC Press, 1996.
  • 4Nessett D M. Factors Affecting Distributed System Security[J]. IEEE Transactions on Sol, ware Engineering, 1987, SE-13(2): 233-248.
  • 5Schneier B. Why Cryptography Is Harder than It Looks[J]. Information Security Bulletin, 1997, 2(2): 31-36.
  • 6Dolev D, Yao Chi-Chih. On the Security of Public Key Protocols[J]. IEEE Transactions on Information Theory, 1983, 29(2): 198-208.
  • 7Nessett D. A Critique of the Burrows, Abbadi and Needham Logic[J]. Operating Systems Review, 1990, 24(2): 35-38.
  • 8Burrows M, Abadi M, Needham R. A Logic of Authentication[J]. ACM Transactions on Computer Systems, 1990, 8(I): 18-36.
  • 9Gong Li, Needham R, Yahalom R. Reasoning About Belief in Cryptographic Protocols[C]//Proceedings of IEEE Symposium on Research in Security and Privacy. [S. 1.]: IEEE Press, 1990: 234-248.
  • 10Cohen M, Dam M. A Completeness Result for BAN Logic[EB/OL]. [2011-06-22]. http://www.access.ee.kth.se/reports/2007/13.pdf.

共引文献41

同被引文献18

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部