期刊文献+

视觉密码在交互式身份认证中的应用研究 被引量:2

Research on the Application of Visual Cryptography in Interactive Authentication
下载PDF
导出
摘要 分析"挑战—响应"式身份认证方案面临的攻击形式,将视觉密码技术应用到交互式的认证方案中,利用视觉密码具有的伪随机数的特性,保证身份认证会话不被重用,并且不使用复杂的传统密码算法,提高了身份认证方案的便捷性和安全性。最后,对身份认证方案进行了常见攻击的抵抗分析。 Based on a comprehensive analysis about attackforms challenge-response authentication scheme faced, this paper applied the visual cryptographic techniques to interactive authentication scheme.This scheme takes advantage of the pseudo daracteristics to ensure the authentication session is notreused,and doesn'tuse complex traditional encryption algorithm, so as to improve the convenience and security of the identity program.
出处 《信息网络安全》 2013年第8期31-32,共2页 Netinfo Security
基金 全军军事学研究生课题[2011JY002-435]
关键词 "挑战-响应" 视觉密码 交互认证 challenge-response visual password interactive authentication
  • 相关文献

参考文献6

二级参考文献34

  • 1周渊,程晓明,柴震川.ID-based Key-insulated Authenticated Key Agreement Protocol[J].Journal of Shanghai Jiaotong university(Science),2007,12(2):247-249. 被引量:1
  • 2Guillou L, Quisquater J. A practical zero-knowledge protocol fitted to security microprocessors minimizing both transmission and memory [C]//Advances in Cryptology-Eurocryp( 1988. Berlin: Springer-Verlag, 1988: 123-128. 被引量:1
  • 3Shamir A. Identity-based cryptosystem and signature schemes[C]//CRYPTO 84. Berlin: Springer-Verlag, 1984: 47-53. 被引量:1
  • 4Weng Jian, Liu Shengli, Chen Kefei, et al. Identity- based key-insulated signature without random oracles [C]//CIS 2006. Berlin: Springer-Verlag, 2007: 470- 480. 被引量:1
  • 5Boneh D, Franklin M. Short signature from well pairing[C]//Boyd C ASIACRYPT 2001. Berlin: Springer-Verlag, 2001: 514-532. 被引量:1
  • 6Zhang F G, Kim K. Signature-masked authentication using the bilinear pairings[R]. [s. l]: International Research Center for Information Security (IRIS), Information and Communications University (ICU), 2002. 被引量:1
  • 7Boneh D, Franklin M. Identity based encryption from well pairing[C]//CRYPTO 2001. Berlin: Springer- Verlag, 2001: 213-229. 被引量:1
  • 8Chen L, Harrison K. Applications of multiple trust authorities in pairing based cryptosystems [C] // LNCS 2437. Berlin: Springer-Verlag, 2002: 260- 275. 被引量:1
  • 9Al-Riyami S, Paterson K. Certificateless public key cryptography [C] // Advances in Cryptology-Asiacrypt' 2003. Berlin: Springer-Verlag, 2003: 452- 472. 被引量:1
  • 10Gentry C. Certificate-based encryption and the certificate revocation problem[C] // Advances in Cryptology-Eurovrypt 2003. Berlin: Springer-Verlag, 2003: 272-293. 被引量:1

共引文献5

同被引文献15

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部