期刊文献+

安全高效的三因素远程身份认证协议 被引量:1

A Secure and Efficient Remote Authenticated Protocol Based on Three Factors
下载PDF
导出
摘要 为有效提高远程身份认证协议的安全性能,将椭圆曲线、挑战/应答机制、生物特征、智能卡和口令认证技术相结合,提出了一种安全高效的三因素身份认证协议。协议采用椭圆曲线的点乘运算,既提升了安全性又降低了运算复杂度。认证双方使用挑战/应答机制的3次握手来实现双向认证,协议的认证过程引入随机数,并完成会话密钥协商。协议的安全性能基于Hash函数的单向性、椭圆曲线的离散对数难题和生物特征的安全特性。通过对多种已知攻击的形式化推演,证明该协议能抵御各种常见攻击,具有较高的安全性能。经仿真实验证明,协议具有更高的运算效率。 In order to effectively improve the security performance of remote identity authentication protocol,a secure and efficient three factors identity authentication protocol is proposed by combining elliptic curve,challenge/response mechanism,biometrics,smart card and password authentication technology.The point multiplication of elliptic curve is adopted in the protocol,which improves the security and reduces the computational complexity.The two sides of authentication use three handshakes of challenge/response mechanism to realize two-way authentication.The protocol introduces random numbers and completes session key agreement.The safety of this protocol is based on the unidirectionality of Hash function,discrete logarithm problem of elliptic curve and the security characteristics of biometrics.Through the formal deduction of a variety of known attacks,it is proved that the protocol can resist various common attacks and has high security performance.Simulation results show that the protocol has higher computational efficiency.
作者 黄朝阳 赵玉超 HUANG Chaoyang;ZHAO Yuchao(School of Information Engineering,Xiamen Ocean College Xiamen,Fujian 361100)
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2022年第3期425-431,共7页 Journal of University of Electronic Science and Technology of China
基金 福建省中青年教师教育科研项目(JAT191316)。
关键词 生物特征 挑战/应答 椭圆曲线 HASH函数 智能卡 口令认证 biometrics challenge/response elliptic curve Hash function smart card password authentication
  • 相关文献

参考文献9

二级参考文献49

  • 1汪世义,吴国伟.三种主要的公钥加密系统及其比较[J].巢湖学院学报,2005,7(3):84-86. 被引量:5
  • 2袁立,穆志纯,徐正光,刘克.基于人耳生物特征的身份识别[J].模式识别与人工智能,2005,18(3):310-315. 被引量:25
  • 3王姣.公钥技术在未来移动通信系统安全中的研究[J].科技信息,2007(5):54-54. 被引量:1
  • 4Vo DL, Kim K. Security enhancement of a remote user au- thentication scheme using bilinear pairings and ECC [C] //IF IP International Conference on Network and Parallel Computing Workshops, 2007: 144-147.
  • 5Pathan ASK, Hong CS. Bilinear-pairing-based remote user au- thentication schemes using smart cards [C] //Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009: 366-371.
  • 6Li Chunta, Huang Minshiang. An efficient biometric-based remote user authentication scheme using smart cards [J]. Journal of Net- work and Computer Applications, 2010, 33 (1): 1-5.
  • 7Chen L, Cheng Z, Smart N P. Identity-based key agreement protocols from pairings [J]. International Journal of Infor- mationSecurity, 2007, 6 (4): 213-241.
  • 8Kocher P,Jaffe J,Jun B.Differential Power Analysis. Advances in Cryptology - CRYPTO ’99, 19th Annual International Cryptology Conference . 1999
  • 9MENEZES A J,VANSTONE S A,OORSCHOT C V.Handbook of applied cryptography. Discrete Mathematics&Its Applications . 1996
  • 10WEI-CHIH L,SUNG-MING Y E N.A DPA Attack on the Implementation of RSA-CRT with Montgomery Reduction. IEICETransactions on Fundamentals of Electronics,Communications and Computer Sciences . 2014

共引文献43

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部