期刊文献+

用于移动计算环境的口令认证协议研究 被引量:1

Password authentication scheme for mobile computing environment
在线阅读 下载PDF
导出
摘要 利用IC(integrated circuit)卡、RSA密码体制以及离散对数,设计了一种适用于移动计算环境的口令认证协议。在服务器侧无需保存验证表,增强了系统的安全性。为了适应移动计算环境中终端计算能力较弱以及无线带宽相对较窄的特点,该协议在无线信道上只需一次认证消息交互。并且,用户在修改密码的时候无需网络侧服务器的参与,在本地终端即可独立完成。利用M/G/1/N排队模型分析协议性能并与TLS(transport layer security)协议比较。 By means of IC (integrated circuit) card, RSA cryptography, and discrete logarithm, a password authentication scheme for mobile computing environment was presented. No verification tables were preserved at the server side to consolidate the security. To be applicable for the mobile computing environment, the scheme was designed as a one-roundtrip protocol to meet the computation-constraint terminals and narrow-bandwidth radio interface. Moreover, the passwords in use could be changed by users without any interaction with servers over the radio. The performance of the scheme was measured by making use of M/G/1/N queuing model and compared with that of TLS.
出处 《通信学报》 EI CSCD 北大核心 2007年第5期36-42,共7页 Journal on Communications
基金 国家杰出青年科学基金资助项目(60525110) 新世纪优秀人才支持计划(NCET-04-0111) 高等学校博士学科点专项科研基金资助项目(20030013006)~~
关键词 认证 密钥建立 口令 排队论 性能分析 TLS RSA authentication key establishment password queuing model performance analysis TLS RSA
  • 相关文献

参考文献28

  • 1EVANS A,KANTROWITZ W,WEISS E.A user authentication scheme not requiring secrecy in the computer[J].Communications of the ACM,1974,17(8):437-442.
  • 2LENNON R E,MATYAS S M,MEYER C H.Cryptographic authentication of time-invariant quantities[J].IEEE Transactions on Communications,1981,29(6):773-777.
  • 3WANG C T,CHANG C C,LIN C H.Using IC cards to remotely login passwords without verification tables[A].Proceedings of 18th International Conference on Advanced Information Networking and Applicadons[C].Fukuoka,Japan,2004.321-326.
  • 4HORNG G.Password authentication without using a password table[J].Information Processing Letters,1995,55(5):247-250.
  • 5WU T C.Remote login authentication scheme based on a geometric approach[J].Computer Communications,1995,18(12):959-963.
  • 6HWANG M S.A remote password authentication scheme based on the digital signature method[J].International Journal of Computer Mathematics,1998,70(4):657-666.
  • 7ELGAMAL T.A public key cryptosystem and a signature scheme based on discrete logarithms[J].IEEE Transaction on Information Theory,1985,31(4):469-472.
  • 8LIN I C,HWANG M S,LI L H.A new remote user authentication scheme for multi-server architecture[J].Future Generation Computer Systems,2003,19(1):13-22.
  • 9TSAUR W J,WU C C,LEE W B.A smart card-based remote scheme for password authentication in multi-server intemet services[J].Computer Standards and Interfaces,2004,27(1):39-51.
  • 10JUANG W S.Efficient multi-server password authentication key agreement using smart cards[J].IEEE Transactions on Consumer Electronics,2004,50(1):251-255.

二级参考文献7

  • 1Lamport L. Password authentication with insecure communication[J]. Comm of the ACM, 1981,24(11):770-772.
  • 2Hwang M S, Li L H. A new remote user authentication with smart card[J]. IEEE Trans on Consumer Electron. 2000,46 (1) : 28- 30.
  • 3Shen J J, Lin C W, Hwang M S. A modified remote user authentication scheme using smart cards [J].IEEE Trans on Consumer Electron, 2003,49 (2) : 414-416.
  • 4Chan C . K, Cheng L M. Cryptoanalysis of a remote user authentication scheme using smart cards [J].IEEE Trans on Consumer Electron, 2000,46 (4) : 992-993.
  • 5Sun H M. An efficient remote user authentication scheme using smart cards [J]. IEEE Trans on Consumer Electronics, 2000,46(40) : 958-961.
  • 6李中献,詹榜华,杨义先.一种基于智能卡的公钥认证方案[J].北京邮电大学学报,1999,22(1):85-87. 被引量:7
  • 7范磊,李建华,诸鸿文.基于单向散列函数的智能卡鉴别方案[J].上海交通大学学报,2002,36(6):891-893. 被引量:1

共引文献2

同被引文献6

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部