期刊文献+

基于圆特性的身份认证与密钥协商

Identity Authentication and Key Agreement Based on Circle Properties
下载PDF
导出
摘要 为了加强几何认证方案的安全性,设计了一种基于圆特性的几何认证与密钥协商方案,该方案根据"n维空间圆上n+1个点可以唯一重构一个圆"的n维空间圆构造原理,采用多变量单向散列函数来计算登录消息,加强了用户登录消息的安全性,使方案能抵抗口令猜测、重放、窃听与离线消息分析攻击.文中采用形式化方法证明了该方案是安全的. In order to improve the security of the authentication scheme based on geometric properties, an identity authentication and key agreement scheme based on circle properties is proposed, the basic principle of which is that an n-dimension circle can be reconstructed by any n + 1 n-dimension points on it, and a multi-variable one-way hash function is used to calculate the login message and to improve the robustness of the login message for security. Thus, the scheme ean withstand the attacks, such as the password guess, replay, eavesdropping and off-line mes- sage analysis. The proposed scheme is proved secure by a formal approach at last.
出处 《华南理工大学学报(自然科学版)》 EI CAS CSCD 北大核心 2009年第5期111-117,共7页 Journal of South China University of Technology(Natural Science Edition)
基金 国家"863"计划项目(2007AA01Z424) 国家自然科学基金资助项目(60572139) 国家科技支撑计划项目(2007BAH13B03) 教育部新世纪优秀人才支持计划项目(NCET-06-0744) 霍英东教育基金资助项目(101069)
关键词 身份认证 密钥协商 安全性 圆特性 形式化方法 identity authentication key agreement security circle property formal approach
  • 相关文献

参考文献13

  • 1郑东曦,唐韶华,黎绍发.Web服务统一身份认证协议[J].华南理工大学学报(自然科学版),2005,33(2):65-69. 被引量:7
  • 2Yang Y J, Deng R H, Bao F. A practical password-based two-server authentication and key exchange system [ J]. IEEE Transactions on Dependable and Secure Computing, 2006,3(2) :105-114. 被引量:1
  • 3Wu T C. Remote login authentication scheme based on a geometric approach [ J]. Computer Communications, 1995, 18(12) :959-963. 被引量:1
  • 4Hwang M S. Cryptanalysis of a remote login authentication scheme [ J ]. Computer Communications, 1999,22 ( 8 ) : 742-744. 被引量:1
  • 5Chien H Y,Jan J K,Tseng Y M. A modified remote login authentication scheme based on geometric approach [ J ]. Journal of Systems and Software ,2001,55 ( 3 ) :287-290. 被引量:1
  • 6Wang S J. Yet another login authentication using N-dimensional construction based on circle property [ J ]. IEEE Transactions on Consumer Electronics, 2003,49 (2) :337-341. 被引量:1
  • 7Wang S H,Bao F,Wang J. Comments on yet another login authentication using n-dimensional construction [ J ]. IEEE Transactions on Consumer Electronics, 2004, 50 (2) :606-608. 被引量:1
  • 8Yang F Y, Jan J K. Cryptanalysis of log-in authentication based on circle property [ J ]. IEEE Transactions on Consumer Electronics ,2004,50 ( 2 ) :625-628. 被引量:1
  • 9Wu T C, He W H. A geometric approach for sharing secrets [ J ]. Computer & Security, 1995,14 ( 2 ) : 135-145. 被引量:1
  • 10Chor L P, Jing H W, Chong T P. A geometric approach for shared secrets, a refinement [ J ]. Computers & Security, 1998,17 ( 10 ) :725-732. 被引量:1

二级参考文献47

  • 1林满山,郭荷清,尹剑飞,高学勤.基于信任度的网络应用对等单点登录[J].华南理工大学学报(自然科学版),2004,32(10):56-61. 被引量:9
  • 2IBM, Microsoft. Security in a Web services world: A proposed architecture and roadmap [EB/OL]. http ://www.ibm.com/developerworks/library/ws-secmap/,2002 - 04 - 07. 被引量:1
  • 3Atkinson B, Della-Libera G, Hada S. Web services security (WS-Security) version 1.0 [EB/OL]. Http://www.ibm. Com/developerworks/library/ws-secure/,2002 - 04 - 05. 被引量:1
  • 4Della-LiberaG, Dixon B, Garg P. Web services secure conversation language (WS-SecureConversation) version 1.0[EB/OL]. http ://www. ibm. com/developerworks/library/ws-secon/, 2002 - 12 - 18. 被引量:1
  • 5Della-Libera G, Dixon B, Garg P. Web services trust language (WS-Trust) version 1.0 [EB/OL]. http://www.ibm. com/developerworks/library/ws-trust/,2002 - 12 - 18. 被引量:1
  • 6Box D, Curbera F, Hondo M. Web services policy framework (WS-Policy) version 1.0 [EB/OL]. http://www.ibm. com/developerworks/library/ws-polfram/,2002 - 12 - 18. 被引量:1
  • 7Shamir A. How to share a secret [J]. Communications of the ACM,1999, 22(11), 612-613. 被引量:1
  • 8Blakley G. Safeguarding cryptographic keys [A]. Proc AFIPS 1979 National Computer Conference [C]. New York: AFIPS Press,1979. 313-317. 被引量:1
  • 9Asmuth C, Bloom J. A modular approach to key safeguarding [J]. IEEE Transactions on Information Theory, 1983, 29(2):208-210. 被引量:1
  • 10Karnin E D, Green J W, Hellman M E. On sharing secret system [J]. IEEE Transactions on Information Theory, 1983, 29(1):35-41. 被引量:1

共引文献119

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部