Two standards for security of WLAN,IEEE 802.11 i and WAPI,are introduced,and some shortcomings of them are pointed out.Based on hash chains technique to construct identity authentication tokens, a new authentication i...Two standards for security of WLAN,IEEE 802.11 i and WAPI,are introduced,and some shortcomings of them are pointed out.Based on hash chains technique to construct identity authentication tokens, a new authentication infrastructure for WLAN is proposed,in which AS authenticates the main entities -STAs in the foremost time.Properties of the proposed scheme are discussed,including security, efficiency and feasibility etc.Compared with 802. 11 i and WAPI,the proposed scheme not only improves efficiency by reducing cost on computation and communication,but also promotes security property -availability by mitigating DoS attacks to AP and AS.At the same time,a self-updating hash chain technique is presented that is embedded in the proposed infrastructure to solve the length limitation of traditional hash chain.展开更多
Micropayment schemes usually do not provide fairness, which means that either the customer or the merchant, or both, can cheat each other and gain a financial advantage by misusing the protocols. This paper proposes a...Micropayment schemes usually do not provide fairness, which means that either the customer or the merchant, or both, can cheat each other and gain a financial advantage by misusing the protocols. This paper proposes an efficient hash chain-based micropayment scheme, which is an offline, prepaid scheme that supports simpler divisibility of digital coins. In the execution of payment protocol, the customer’s dis- bursement and the merchant’s submittal are performed step by step, whoever cannot gain addition profits even if he breaks off the transaction. The hash chain can also be used for transactions with different mer- chants. Unlike other micropayment schemes, e.g., PayWord, no public-key operation is required,which im- proves the efficiency. The scheme also provides restricted anonymity.展开更多
基金supported by the NNSF of China(No.90204015, 60473021)the Key Technologies Research and Development Program of Henan Province of China(No.0524220044,062426001)the Research Found of HAUT of China(No.0401009, 050211,050215,050216)
文摘Two standards for security of WLAN,IEEE 802.11 i and WAPI,are introduced,and some shortcomings of them are pointed out.Based on hash chains technique to construct identity authentication tokens, a new authentication infrastructure for WLAN is proposed,in which AS authenticates the main entities -STAs in the foremost time.Properties of the proposed scheme are discussed,including security, efficiency and feasibility etc.Compared with 802. 11 i and WAPI,the proposed scheme not only improves efficiency by reducing cost on computation and communication,but also promotes security property -availability by mitigating DoS attacks to AP and AS.At the same time,a self-updating hash chain technique is presented that is embedded in the proposed infrastructure to solve the length limitation of traditional hash chain.
基金Supported by the National Natural Science Foundation of China (No. 90104033)
文摘Micropayment schemes usually do not provide fairness, which means that either the customer or the merchant, or both, can cheat each other and gain a financial advantage by misusing the protocols. This paper proposes an efficient hash chain-based micropayment scheme, which is an offline, prepaid scheme that supports simpler divisibility of digital coins. In the execution of payment protocol, the customer’s dis- bursement and the merchant’s submittal are performed step by step, whoever cannot gain addition profits even if he breaks off the transaction. The hash chain can also be used for transactions with different mer- chants. Unlike other micropayment schemes, e.g., PayWord, no public-key operation is required,which im- proves the efficiency. The scheme also provides restricted anonymity.