期刊文献+

改进的基于智能卡的远程异步认证协议 被引量:3

Improved remote asynchronous authentication scheme with smart card
下载PDF
导出
摘要 远程认证协议允许远程服务器和用户通过不安全信道实现相互认证。唐宏斌等指出Chen等方案的基于智能卡的远程认证协议存在着一些安全问题,如丢失智能卡攻击,重放攻击等,并且提出一种基于智能卡的远程认证协议,为了抵抗重放攻击而引入时间戳机制。提出一种改进的基于智能卡的远程异步认证方案,在能抵抗提到的所有攻击条件下,不需要考虑时钟同步问题而能抵抗重放攻击,使操作更简单且未增加计算性能代价。 Remote authentication scheme allows a remote server and the user to realize mutual authe-ntication through the unsafe channel. Tang Hongbin et al claim that there are some security problems in Chen et al’s scheme, such as loss of smart card attack, replay attack, etc. It proposes an improved remote authentication scheme based on smart card. But Tang Hongbin et al introduce timestamp mechanism to resist replay attack. This paper proposes a remote asynchronous authenti-cation scheme based on smart card. The scheme doesn’t need to sonsider clock synchronization and can resist all men-tioned attacks, operation is easier and the performance cost is not increased.
作者 皮兰 武传坤
出处 《计算机工程与应用》 CSCD 2014年第8期61-65,89,共6页 Computer Engineering and Applications
关键词 异步 认证协议 智能卡 椭圆曲线离散对数问题 asynchronous authentication scheme smart card Elliptic Curve Discrete Logarithm Problem(ECDLP)
  • 相关文献

参考文献16

  • 1Lamport L.Password authentication with insecure com- munication[J].Communication of the ACM, 1981,24 ( 11 ) : 770-772.
  • 2Hwang M S, Li L H.A new remote user authentication scheme suing smart cards[J].IEEE Transactions on Con- sumer Electronics, 2000,46( 1 ) : 28-30.
  • 3Awasthi A K, Lal S.A remote user authentication scheme using smart cerd with forward secrecy[J].IEEE Transac- tions on Consumer Electronics,2003,49(4) : 1246-1248.
  • 4Chien H Y, Chen C H.A remote authentication scheme preserving user anonymity[C]//Proceedings of the 19th International Conference on Advanced Information Net- working and Applications, 2005 : 245-248.
  • 5Duan X, Liu W J, Zhang Q.Security improvement on Chien et al's remote user authentication scheme using smart cards[C]//Proceedings of the IEEE International Conference on Computational Intelligence and Security, 2006:1133-1135.
  • 6Yoon E J, Ryu E K, Yoo K Y.Further improvement of an efficient password based user authentication scheme using smart cards[J].IEEE Transactions on Consumer Electronics,2004,50(2) : 612-614.
  • 7Ku W C, Chen S M.Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards[J].IEEE Transactions on Con- sumer Electronics, 2004,50( 1 ) : 204-207.
  • 8Hsiang H C, Shih W K.Weakness and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards[J].Computer Communications, 2009,32 (4) : 649-652.
  • 9Chen C L,Lin Y F,Wang N C,et al.An improvement on Hsiang and Shih's remote user authentication scheme using smart cards[C]//Proceedings of the 12th ACIS Inter- national Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distribute Comput- ing(SNPD), 2011 : 53-57.
  • 10唐宏斌,刘心松.增强的基于智能卡的远程用户认证协议[J].计算机工程与应用,2012,48(19):61-65. 被引量:6

二级参考文献51

  • 1李国民.Yahalom协议的安全性分析及其改进方法[J].微机发展,2005,15(4):96-97. 被引量:4
  • 2卓继亮,李先贤,李建欣,怀进鹏.安全协议的攻击分类及其安全性评估[J].计算机研究与发展,2005,42(7):1100-1107. 被引量:16
  • 3陆丽娜等译.分布式操作系统[M].北京:电子工业出版社,1999-12..
  • 4Mills D L.NTP Architecture,Protocol And Algorithms University of Delaware[EB/OL].http ://www.eecis.udel.edu/-mills/database/brief/arch/ arch.htm, 2001-05-25.
  • 5Mills D LInternet Time Synchronization:the Network Time Protocol[J]. IEEE Trans Communications, 1991 : 1482.
  • 6Ramanthan P.Hardware-assisted Software Clock Synchronization for Homogenous Distributed Systems[J].IEEE computer,1990:514-524.
  • 7Mills D L.Network Time Protocol(Version 3) Specifications, implementation, and Analysis[EB/OL].http://61.144.25.119/gate/big5/www. fags.org/rfcs/rfc 1305.html, 1992-03.
  • 8陆丽娜译.分布式操作系统[M].北京:电子工业出版社,1999-12..
  • 9Cristian F. A probabilistic approach to distributed clock synchroniz- ation [J]. Distributed Computing, 1989, 3: 146-158.
  • 10Arvind K. Probabilistic Clock Synchronization in Distributed Systems [J]. IEEE Transactions on Parallel and Distributed Systems, 1994, 5(5): 474-487.

共引文献87

同被引文献29

  • 1孙健.基于Web的身份认证系统分析[J].电子技术(上海),2020(12):28-29. 被引量:1
  • 2向进.RSA加密算法的安全性分析[J].吉首大学学报(自然科学版),2011,32(1):42-44. 被引量:9
  • 3LAMPORT L.Password authentication with insecure commu- nication[J]. Communication of the ACM, 1981,24( 11 ) : 770- 772.
  • 4CHANG C C,WU T C.Remote password authentication with smartcards[J].IEE Proceedings-E Computers and Digital Techniques, 1993,138(3) : 165-168.
  • 5CHIEN H Y,JAN J K,TSENG Y M.An efficient and practical solution to remote authentication:smart card[J]. Computers and Security, 2002,21 (4) : 372-375.
  • 6KU W C, CHEN S M.Weaknesses and improvements of an efficient password based remote user authentication scheme using smart eards[J].IEEE Transactions on Consumer Elee- tronics, 2004,50( 1 ) : 204-207.
  • 7HSU C L.Seeurity of Chien et al.'s remote user authenti- cation scheme using smart cards[J].Computer Standards and Interfaces, 2004,26(3) : 167-169.
  • 8HSIANG H C, SHIH W K.Weakness and improements of the Yoon-Ryu-Yoo remote user authentieation scheme using smartcards [J]. Computer Conmmnications, 2009,32(4) : 649- 652.
  • 9CHEN C L,LIN Y F,WANG N C.An improvement on tlsiang and Shih's remote user authentication scheme using smarteards[C].Proeeedings of the 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distribute Computing.2011 : 53-57.
  • 10MILLER V S.Use of elliptic cmces in cryptography[J]. Advances in cryptology, proceedings of CRYPTO. 1986,85 (218) : 417-426.

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部