期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Provably Secure Authenticated Diffie-Hellman Key Exchange for Resource-Limited Smart Card 被引量:1
1
作者 简宏宇 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期436-439,共4页
Authenticated Diffie-Hellman key agreement is quite popular for establishing secure session keys. As resource-limited mobile devices are becoming more popular and security threats are increasing, it is desirable to re... Authenticated Diffie-Hellman key agreement is quite popular for establishing secure session keys. As resource-limited mobile devices are becoming more popular and security threats are increasing, it is desirable to reduce computational load for these resource-limited devices while still preserving its strong security and convenience for users. In this paper, we propose a new smart-card-based user authenticated key agreement scheme which allows users to memorize passwords, reduces users' device computational load while still preserves its strong security. The proposed scheme effectively improves the computational load of modular exponentiations by 50%, and the security is formally proved. 展开更多
关键词 DIFFIE-HELLMAN key agreement forward secrecy AUTHENTICATION PASSWORD
原文传递
Comments on Enhanced Yoking Proof Protocols for Radio Frequency Identification Tags and Tag Groups
2
作者 简宏宇 叶明贵 +1 位作者 吴宗成 李静怡 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第5期604-609,共6页
A radio frequency identification (RFID) yoking proof scheme can generate proofs of simultaneous presence of two tags in the range of a specified reader so that an off-line verifier can verify the proofs later. This pr... A radio frequency identification (RFID) yoking proof scheme can generate proofs of simultaneous presence of two tags in the range of a specified reader so that an off-line verifier can verify the proofs later. This proof has found several interesting applications. However, many existing RFID yoking schemes are vulnerable to replay attacks. To overcome the weaknesses, Cho et al. proposed a new RFID yoking proof protocol and a new grouping protocol. Unfortunately, Cho et al.'s schemes are still vulnerable to replay attacks. In this paper, in addition to demonstrating weaknesses, we further discuss the rationale behind these weaknesses to provide a guide line for designing secure RFID yoking schemes. Based on the guide line, we propose a new RFID yoking scheme and a new RFID grouping scheme. Performance evaluation shows that our scheme outperforms its counterparts. 展开更多
关键词 radio frequency identification (RFID) yoking AUTHENTICATION replay attack GROUPING
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部