期刊文献+

一个安全有效的智能卡远程用户认证方案 被引量:1

A secure and efficient remote user authentication scheme using smart cards
下载PDF
导出
摘要 2000年,Hwang和Li提出了一个新的智能卡远程用户认证方案,随后Chan和Cheng对该方案进行了成功的攻击.最近Shen,Lin和Hwang针对该方案提出了一种不同的攻击方法,并提供了一个改进方案用于抵御这些攻击.2003年,Leung等认为Shen-Lin-Hwang改进方案仍然不能抵御Chan和Cheng的攻击,他们用改进后的Chang-Hwang攻击方法进行了攻击.文中主要在Hwang-Li方案的基础上,提出了一个新的远程用户认证方案,该方案主要在注册阶段和登录阶段加强了安全性,抵御了类似Chan-Cheng和Chang-Hwang的攻击. In 2000, Hwang and Li proposed a new remote user authentication scheme using smart cards. Chan and Cheng showed that the masquerade attack is successful on this scheme. Recently Shen, Lin and Hwang pointed out a different type of attack on this scheme and presented a modified scheme to remove these defects. Further in 2003, Leung, et al. showed that this modified scheme is still vulnerable to the attack proposed by Chan and Cheng. In addition, they showed that the extended attack proposed by Chang and Hwang also works well. In this paper we present a new remote user authentication scheme which is a modified form of Hwang-Li's scheme. The scheme can withstand attack that similar to Chan and Cheng'attack and Chang and Hwang' attack in registration phase and authentication phase.
出处 《高校应用数学学报(A辑)》 CSCD 北大核心 2007年第4期379-384,共6页 Applied Mathematics A Journal of Chinese Universities(Ser.A)
基金 国家自然科学基金(10271037) 浙江省自然科学基金(103060) 浙江省教育厅科研计划项目(20061069)
关键词 认证方案 远程用户 智能卡 密码分析 安全 authentication remote user smart card cryptanalysis security
  • 相关文献

参考文献11

  • 1Chang C C, Wu T C. Remote password authentication with smart cards[J]. IEEE Proceedings-E, 1993, 138(3): 165-168. 被引量:1
  • 2Hwang M S, Li L H. A new remote user authentication scheme using smart cards[J].IEEE Trans Consumer Electron, 2000, 46(1): 28-30. 被引量:1
  • 3Chan C K, Cheng L M. Cryptanalysis of a remote user authentication scheme using smart cards[J]. IEEE Trans Consumer Electron, 2000,46(3): 992-993. 被引量:1
  • 4Shen K C, Lin C W, Hwang M S. A modified remote user authentication scheme using smart cards[J]. IEEE Trans Consumer Electron, 2003, 49(2): 414-416. 被引量:1
  • 5Chang C C, Hwang K F. Some forgery attack on a remote user authentication scheme using smart cards[J].Informatics, 2003, 14(3): 189-294. 被引量:1
  • 6Leung K C, Cheng L M, Fong A S, et al, Cryptanalysis of a modified remote user authentication scheme using smart cards[J]. IEEE Trans Consumer Electron, 2003, 49(4): 1243-1245. 被引量:1
  • 7张先红.数字签名原理与技术[M].北京:机械工业出版社,2004:80~87,92~97,166~170 被引量:7
  • 8于秀源.复合加密的公钥密码系统[A].密码学进展-CHINACRYPTO'92[C].北京:科学出版社,1992.55~58. 被引量:2
  • 9吴铤,于秀源.一个安全有效的身份鉴别协议与对应的数字签名方案[J].通信学报,2002,23(7):70-75. 被引量:5
  • 10YuXiuyuan.AN APPROXIMATE EXPRESSION RELATED WITH RSA FIXED POINTS[J].Applied Mathematics(A Journal of Chinese Universities),2004,19(1):1-8. 被引量:4

二级参考文献13

  • 1于秀源.复合加密的公钥密码系统.密码学进展--CHINACRYPTO'92[M].北京:科学出版社,1992.55-58. 被引量:1
  • 2SCHNEIER B.应用密码学--协议、算法与C源程序[M].北京:机械工业出版社,2000.. 被引量:3
  • 3潘承洞 潘承彪.初等数论[M].北京:北京大学出版社,1991.. 被引量:10
  • 4Desmedt Y,Frankel Y.Shared generation of authenticators and signatures[A].In:Advances in Cryptology-CRYPTO'91[C].1991:457-469. 被引量:1
  • 5Wang C T,Lin C H.Threshold signature schemes with traceable signers in group communications[J].Computer Communications.1998,21(8):771-776. 被引量:1
  • 6Tseng Y M,Jen J K.Attacks on threshold signature schemes with traceable signers[J].Information Processing Letters,1999,71:1-4. 被引量:1
  • 7Li,Z C.Security of Wang et al.'s group-oriented(t,n)threshold signature schemes with traceable signers[J].Information Processing Letters,2001,80:295-298. 被引量:1
  • 8Nyberg K,Rueppel R A.Message recovery for signature schemes based on the discrete logarithm problem[A].EUROCRYPT'94[C].1994,182-193. 被引量:1
  • 9Lin Chen-Chi,Laih Chi-Sung.Cryptanalysis of Nyberg-Rueppel's Message Recovery Scheme[J].IEEE Communication Letters,2000,4(7):231-232. 被引量:1
  • 10徐秋亮.改进门限RSA数字签名体制[J].计算机学报,2000,23(5):449-453. 被引量:63

共引文献14

同被引文献15

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部