期刊文献+
共找到174篇文章
< 1 2 9 >
每页显示 20 50 100
Improvement on a Biometric Based User Authentication Scheme in Wireless Sensor Networks Using Smart Cards 被引量:3
1
作者 DU Jianqi KANG Baoyuan +1 位作者 HAN Yanbao QIAN Kun 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2020年第2期155-161,共7页
With the development of the Internet of Things(IoT)technique,sensitive information collected by sensors may be leaked.In recent years,many authentication schemes have been proposed.Banerjee et al proposed a biometric ... With the development of the Internet of Things(IoT)technique,sensitive information collected by sensors may be leaked.In recent years,many authentication schemes have been proposed.Banerjee et al proposed a biometric based user authentication scheme in wireless sensor networks using smart cards in 2019.But we found that Banerjee et al's authentication scheme is vulnerable to impersonation attacks.In order to overcome the weaknesses of Banerjee et al's scheme,we propose a new authentication scheme.In our proposed scheme,we only use the exclusive-or operation and one-way Hash function for the efficiency,which can reduce the computation burden for the IoT devices.In the authentication and session key agreement phase,the secret registration parameter is not used for the authentication,and the session key is given for the all entities.In the Devol-Yao threat model,the security analysis demonstrates that our proposed authentication scheme can resist well-known attacks. 展开更多
关键词 authentication scheme BIOMETRIC SECURITY smart card
原文传递
ID-Based User Authentication Scheme for Cloud Computing 被引量:1
2
作者 Ping-Liang Chen Jen-Ho Yang Ching-I Lin 《Journal of Electronic Science and Technology》 CAS 2013年第2期221-224,共4页
In cloud computing environments, user authentication is an important security mechanism because it provides the fundamentals of authentication, authorization, and accounting (AAA). In 2009, Wang et al. proposed an i... In cloud computing environments, user authentication is an important security mechanism because it provides the fundamentals of authentication, authorization, and accounting (AAA). In 2009, Wang et al. proposed an identity-based (ID-based) authentication scheme to deal with the user login problem for cloud computing. However, Wang et aL's scheme is insecure against message alteration and impersonation attacks. Besides, their scheme has large computation costs for cloud users. Therefore, we propose a novel ID-based user authentication scheme to solve the above mentioned problems. The proposed scheme provides anonymity and security for the user who accesses different cloud servers. Compared with the related schemes, the proposed scheme has less computation cost so it is very efficient for cloud computing in practice. 展开更多
关键词 ANONYMITY cloud computing identity-based scheme user authentication user identity.
在线阅读 下载PDF
A Lightweight Anonymous Authentication and Key Negotiation Scheme in Smart Home Environments
3
作者 ZUO Xinyu WANG Zhangang +2 位作者 LI Anqian HUO Yuyan NIU Shufang 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2023年第6期523-530,共8页
With the rapid development of Internet of Things(IoT)technology,smart home users can access and control smart devices remotely to enjoy convenient and efficient services.However,sensitive data collected by smart devic... With the rapid development of Internet of Things(IoT)technology,smart home users can access and control smart devices remotely to enjoy convenient and efficient services.However,sensitive data collected by smart devices is vulnerable to attacks such as eavesdropping and simulation when transmitted through public channels.At the same time,the security of resource-constrained smart devices is low,and attackers may use the controlled devices to carry out malicious operations further.To address the aforementioned existing security issues,this paper proposes a lightweight user anonymous authentication scheme for resource-constrained smart home environments.At the same time,the security analysis is carried out to further prove the proposed scheme's security.Finally,the performance analysis between the proposed scheme and the existing similar schemes proves that the proposed scheme has advantages in calculation cost and safety characteristics. 展开更多
关键词 smart home SECURITY LIGHTWEIGHT authentication scheme
原文传递
A Provably Secure and Efficient Remote Password Authentication Scheme Using Smart Cards
4
作者 Fairuz Shohaimay Eddie Shahril Ismail 《Computers, Materials & Continua》 SCIE EI 2022年第6期6125-6145,共21页
Communication technology has advanced dramatically amid the 21st century,increasing the security risk in safeguarding sensitive information.The remote password authentication(RPA)scheme is the simplest cryptosystem th... Communication technology has advanced dramatically amid the 21st century,increasing the security risk in safeguarding sensitive information.The remote password authentication(RPA)scheme is the simplest cryptosystem that serves as the first line of defence against unauthorised entity attacks.Although the literature contains numerous RPA schemes,to the best of the authors’knowledge,only few schemes based on the integer factorisation problem(IFP)and the discrete logarithm problem(DLP)that provided a provision for session key agreement to ensure proper mutual authentication.Furthermore,none of the previous schemes provided formal security proof using the random oracle model.Therefore,this study proposed an improved RPA scheme with session key establishment between user and server.The design of the proposed RPA scheme is based on the widely established Dolev-Yao adversary model.Moreover,as the main contribution,a novel formal security analysis based on formal definitions of IFP and DLP under the random oracle model was presented.The proposed scheme’s performance was compared to that of other similar competitive schemes in terms of the transmission/computational cost and time complexity.The findings revealed that the proposed scheme required higher memory storage costs in smart cards.Nonetheless,the proposed scheme is more efficient regarding the transmission cost of login and response messages and the total time complexity compared to other scheme of similar security attributes.Overall,the proposed scheme outperformed the other RPA schemes based on IFP and DLP.Finally,the potential application of converting the RPA scheme to a user identification(UI)scheme is considered for future work.Since RPA and UI schemes are similar,the proposed approach can be expanded to develop a provably secure and efficientUI scheme based on IFP and DLP. 展开更多
关键词 authentication scheme discrete logarithm factorisation PASSWORD provable security
在线阅读 下载PDF
Analysis and Improvement of an Authentication Scheme for Fog Computing Services
5
作者 HUO Yuyan KANG Baoyuan +2 位作者 NIU Shufang LI Anqian ZUO Xinyu 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2024年第3期209-218,共10页
Fog computing utilizes devices in the edge network to transmit data with very low latency and supports high mobility. However, fog computing inherits security and privacy problems from cloud computing. Therefore, vari... Fog computing utilizes devices in the edge network to transmit data with very low latency and supports high mobility. However, fog computing inherits security and privacy problems from cloud computing. Therefore, various privacy schemes for fog computing have been proposed to prevent different types of attacks. Recently, Weng et al proposed a fog computing authentication scheme;after analyzing, we found that Weng et al's scheme cannot resist user tracking attack and user impersonation attack. Then, we propose an improved scheme through adding a password, modifying the calculation method of Ei, and adding timestamps. In addition, we also compare the improved scheme with existing authentication schemes in terms of security and computational efficiency. The results show that the improved scheme is more secure and has less computation. 展开更多
关键词 authentication scheme fog computing SECURITY
原文传递
Analysis and Improvement of a Privacy-Preserving Authentication Scheme for Telecare Medical Information System Environment
6
作者 NIU Shufang KANG Baoyuan +2 位作者 LI Anqian HUO Yuyan ZUO Xinyu 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2023年第6期531-540,共10页
Telecare Medical Information System(TMIS) can provide various telemedicine services to patients. However, information is communicated over an open channel. An attacker may intercept, replay, or modify this information... Telecare Medical Information System(TMIS) can provide various telemedicine services to patients. However, information is communicated over an open channel. An attacker may intercept, replay, or modify this information. Therefore, many authentication schemes are proposed to provide secure communication for TMIS. Recently, Yu et al proposed a privacy-preserving authentication scheme in the Internet of Medical Things(IoMT)-enabled TMIS environments. They emphasize that their scheme is resistant to various attacks and ensures anonymity. Unfortunately, this paper demonstrates that Yu et al's scheme is vulnerable to impersonation attacks, replay attacks, and tracking attacks and cannot mutually authenticate. To overcome the shortcomings of Yu et al's scheme, we mainly improve the authentication and key agreement process and propose a corresponding improved scheme. We also compare the improved scheme with several existing authentication schemes in terms of security and computational efficiency. 展开更多
关键词 MEDICAL authentication scheme Telecare Medical Information System(TMIS) PRIVACY-PRESERVING
原文传递
Security Considerations on Three-Factor Anonymous Authentication Scheme for WSNs
7
作者 Hyunsung Kim Beaton Ofesi Denice Kapito 《Journal of Computer and Communications》 2021年第3期1-9,共9页
Wireless sensor networks (WSNs) are used to monitor various environmental conditions including movement, pollution level, temperature, humidity, and etc. Secure authentication is very important for the success of WSNs... Wireless sensor networks (WSNs) are used to monitor various environmental conditions including movement, pollution level, temperature, humidity, and etc. Secure authentication is very important for the success of WSNs. Li <i>et al</i>. proposed a three-factor anonymous authentication scheme in WSNs over Internet of things (IoT). They argued that their authentication scheme achieves more security and functional features, which are required for WSNs over IoT. Especially, they insisted that their user authentication scheme provides security against sensor node impersonation attack, and resists session-specific temporary information attack and various other attacks. However, this paper shows some security weaknesses in Li <i>et al</i>.’s scheme, especially focused on sensor node masquerading attack, known session-specific temporary information attack and deficiency of perfect forward secrecy. Especially, security considerations are very important to the modern IoT based applications. Thereby, the result of this paper could be very helpful for the IoT security researches. 展开更多
关键词 Security Considerations on Three-Factor Anonymous authentication scheme for WSNs
在线阅读 下载PDF
A New Forward-Secure Authenticated Encryption Scheme with Message Linkages 被引量:1
8
作者 LI Yanping SI Guangdong WANG Yumin 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1537-1540,共4页
Yoon and Yoo recently proposed a robust authenticated encryption scheme and claimed their scheme has the properties of forward secrecy and confidentiality. The current paper, however, points out that Yoon-Yoo's schem... Yoon and Yoo recently proposed a robust authenticated encryption scheme and claimed their scheme has the properties of forward secrecy and confidentiality. The current paper, however, points out that Yoon-Yoo's scheme also can not provide forward secrecy and confidentiality such that any adversary can easily recover the transferred message. Based on intractability of reversing the one-way hash function and discrete logarithm problem, an improved authenticated encryption scheme with messages linkage is proposed. The above security faults get solved perfectly. The new scheme is proven to satisfy all the basic security requirements of the authenticated encryption scheme. And by the concrete comparison, it has the similar efficiency of the original scheme. 展开更多
关键词 authenticated encryption scheme NON-REPUDIATION forward security
在线阅读 下载PDF
Anonymous and Unlinkable Membership Authentication with Illegal Privilege Transfer Detection
9
作者 Sung-Ming Yen Tsung-Min Kuo Tzu-Yu Yang 《International Journal of Communications, Network and System Sciences》 2018年第2期9-26,共18页
Anonymous authentication schemes, mostly based on the notion of group signatures, allow a group member to obtain membership from a server and gain access rights if the member can prove their authenticity to the verifi... Anonymous authentication schemes, mostly based on the notion of group signatures, allow a group member to obtain membership from a server and gain access rights if the member can prove their authenticity to the verifier. However, existing authentication schemes are impractical because they neglect to provide an exclusive verification of the blacklist. In addition, the schemes are unaware of malicious members who are involved in privilege transferring. In this paper, a novel membership authentication scheme providing detection of membership transfer and proof of membership exclusiveness to the blacklist is proposed. 展开更多
关键词 ANONYMOUS authentication schemes TRAITOR TRACING REVOCATION of MEMBERSHIP Dynamic MEMBERSHIP
在线阅读 下载PDF
The Multireceiver Commitment Schemes
10
作者 WANG Shuhong QI Zhifeng 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期759-764,共6页
Existing commitment schemes were addressed under the classic two-party scenario, However, popularity of the secure multi-party computation in today's lush network communication is motivating us to adopt more sophisti... Existing commitment schemes were addressed under the classic two-party scenario, However, popularity of the secure multi-party computation in today's lush network communication is motivating us to adopt more sophisticate commitment schemes. In this paper, we study for the first time multireceiver commitment in unconditionally secure setting, i.e., one committer promises a group of verifiers a common secret value (in computational setting it is trivial). We extend the Rivest model for this purpose and present a provably secure generic construction using multireceiver authentication codes (without secrecy) as building blocks. Two concrete schemes are proposed as its immediate implementations, which are almost as efficient as an optimal MRA-code. We believe using other primitives to construct variants of this concept will open doors for more interesting research. 展开更多
关键词 commitment scheme multi-party computation unconditional security authentication code verifiable secret sharing
原文传递
A Note on a Provable Secure Encryption Scheme
11
作者 王明强 秦静 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第6期655-658,共4页
A Cramer-Shoup scheme was modified in a variant way. The major advantage with respect to Kurosawa-Desmedt scheme is that it saves a key parameter and produces shorter ciphertext. The proof of security shows that our s... A Cramer-Shoup scheme was modified in a variant way. The major advantage with respect to Kurosawa-Desmedt scheme is that it saves a key parameter and produces shorter ciphertext. The proof of security shows that our scheme can be instantiated with any computational secure key derivation and message authentication functions. Thus it extends the applicability of the Kurosawa-Desmedt scheme and improves its efficiency. 展开更多
关键词 hybrid encryption scheme chosen-ciphertext attack authentication function
原文传递
Analysis of the Desynchronization Attack Impact on the E2EA Scheme
12
作者 Shadi Nashwan 《Computer Systems Science & Engineering》 SCIE EI 2022年第5期625-644,共20页
The healthcare IoT system is considered to be a significant and modern medical system.There is broad consensus that these systems will play a vital role in the achievement of economic growth in numerous growth countri... The healthcare IoT system is considered to be a significant and modern medical system.There is broad consensus that these systems will play a vital role in the achievement of economic growth in numerous growth countries.Among the major challenges preventing the fast and widespread adoption of such systems is the failure to maintain the data privacy of patients and the integrity of remote clinical diagnostics.Recently,the author proposed an end-to-end authentication scheme for healthcare IoT systems(E2EA),to provide a mutual authentication with a high data rate between the communication nodes of the healthcare IoT systems.Although the E2EA authentication scheme supports numerous attractive security services to resist various types of attack,there is an ambiguous view of the impact of the desynchronization attack on the E2EA authentication scheme.In general,the performance of the authentication scheme is considered a critical issue when evaluating the applicability of such schemes,along with the security services that can be achieved.Therefore,this paper discusses how the E2EA authentication scheme can resist the desynchronization attack through all possible attack scenarios.Additionally,the effect of the desynchronization attack on the E2EA scheme performance is analyzed in terms of its computation and communication costs,based on a comparison with the recently related authentication schemes that can prevent such attack.Moreover,this research paper finds that the E2EA authentication scheme can not only prevent the desynchronization attack,but also offers a low cost in terms of computations and communications,and can maintain consistency and synchronization between the communication nodes of the healthcare IoT systems during the next authentication sessions. 展开更多
关键词 Desynchronization attack healthcare IoT systems E2EA scheme mutual authentication ANONYMITY perfect forward secrecy
在线阅读 下载PDF
基于高效历史工作证明区块链的无人机身份认证方案
13
作者 杜晓玉 张俊杰 +2 位作者 李辉 党兰学 韩志杰 《河南大学学报(自然科学版)》 北大核心 2025年第1期21-31,共11页
当前,无人机身份认证网络存在着密钥泄露、冒充攻击和单点故障等问题.因此,有关研究人员提出将区块链技术与无人机身份认证网络结合起来.但现有基于区块链的无人机身份认证方案中存在着资源消耗大、交易费用高、吞吐量低和交易确认延迟... 当前,无人机身份认证网络存在着密钥泄露、冒充攻击和单点故障等问题.因此,有关研究人员提出将区块链技术与无人机身份认证网络结合起来.但现有基于区块链的无人机身份认证方案中存在着资源消耗大、交易费用高、吞吐量低和交易确认延迟大等问题.为此提出了一种新型的无人机身份认证方案——基于高效历史工作证明区块链的无人机身份认证方案(EPOH).为提升通讯效率,EPOH方案采用了联盟链作为数据存储中心,并通过统计一段时间内各节点转发交易数量的方法来优化节点选举过程.此外还设置了冷却期来避免单个节点连续多次成为领导者,从而保障了系统的去中心化特性.EPOH方案还通过连续哈希证明技术,通过生成区块内的事件次序证明,消除了时钟同步的需要,从而大幅提高共识达成速度.安全分析部分显示出EPOH方案能够抵御恶意分叉的能力.实验分析部分验证了EPOH方案能够有效提高系统吞吐量,降低交易确认延迟,显著降低资源消耗和交易成本. 展开更多
关键词 无人机身份认证方案 区块链 共识算法 历史工作证明
原文传递
可证安全的铁路站场移动终端安全接入认证方案
14
作者 张德栋 冯凯亮 +2 位作者 陈勋 祁振亚 黄勤龙 《中国铁道科学》 北大核心 2025年第2期225-232,共8页
针对铁路站场无线Wi-Fi网络移动终端安全接入风险和接入效率问题,提出1种铁路站场移动终端安全接入认证方案。首先,基于铁路站场既有移动终端安全接入架构,通过可信授权实现移动终端在接入控制器上的安全接入认证,减弱对Wi-Fi安全网关... 针对铁路站场无线Wi-Fi网络移动终端安全接入风险和接入效率问题,提出1种铁路站场移动终端安全接入认证方案。首先,基于铁路站场既有移动终端安全接入架构,通过可信授权实现移动终端在接入控制器上的安全接入认证,减弱对Wi-Fi安全网关的依赖;其次,鉴于铁路站场移动终端资源受限的特点,采用哈希与点乘运算,降低站场移动终端的计算开销;最后,对该方案进行安全性证明。结果表明:该方案满足不可伪造性、接入权限可控性、异常接入可追踪性和抗中间人攻击等特点,具有较高的安全性;与其他相关方案对比,所提方案的计算和通信开销更小,适用于能源受限的移动终端,满足站场无线移动终端接入认证的安全性和高效性要求。 展开更多
关键词 铁路站场 无线网络 安全接入 认证方案 移动终端
在线阅读 下载PDF
面向车联网高效安全的消息认证方案 被引量:21
15
作者 吴黎兵 谢永 张宇波 《通信学报》 EI CSCD 北大核心 2016年第11期1-10,共10页
提出一种新型高效的基于身份的消息认证方案,该方案采用椭圆曲线密码构建了轻量级的安全认证协议,无需双线性对运算,降低了签名与认证过程的运算复杂性,同时提供了条件隐私保护的功能,安全分析验证了该方案可以满足VANET的安全需求。性... 提出一种新型高效的基于身份的消息认证方案,该方案采用椭圆曲线密码构建了轻量级的安全认证协议,无需双线性对运算,降低了签名与认证过程的运算复杂性,同时提供了条件隐私保护的功能,安全分析验证了该方案可以满足VANET的安全需求。性能分析表明,与最近的相关方案相比,该方案不仅减少了签名与验证的计算开销,同时也降低了通信开销。 展开更多
关键词 车联网 认证方案 椭圆曲线密码 效率 条件隐私保护
在线阅读 下载PDF
可完全脱离信赖第三方的认证系统 被引量:7
16
作者 曾贵华 王新梅 诸鸿文 《通信学报》 EI CSCD 北大核心 2001年第8期41-46,共6页
本文基于量子密码提出了一种新的认征体系,并提出了几个基于量子密钥的认证方案。这些方案以最近提出的量子密码学为基础,实现了单钥体制认证方案和双钥体制认证方案中能实现的认证功能,并具有这两种体系中无法实现的优点。特别是该... 本文基于量子密码提出了一种新的认征体系,并提出了几个基于量子密钥的认证方案。这些方案以最近提出的量子密码学为基础,实现了单钥体制认证方案和双钥体制认证方案中能实现的认证功能,并具有这两种体系中无法实现的优点。特别是该方案的认证性与可信赖第三方(trusted third party)无关。其认证体系的建立过程是一种动态过程。 展开更多
关键词 量子密码 认证方案 第三方信赖 密码学
在线阅读 下载PDF
一种新的基于PKI的动态身份认证系统的设计 被引量:9
17
作者 张秋余 梁爽 王怀江 《计算机应用研究》 CSCD 北大核心 2006年第10期116-118,共3页
针对现有身份认证技术存在的缺点,将PKI技术与挑战/应答认证机制相结合,提出了一种新的基于PKI的动态身份认证系统,并具体论述了该系统的结构和认证协议,同时对此身份认证系统的安全性进行了分析,指出了优点和不足。
关键词 动态身份认证 认证令牌 PKI 挑战/应答认证机制 网络安全
在线阅读 下载PDF
适用于数字移动通信系统的用户认证方案 被引量:6
18
作者 王晓明 常祖领 +1 位作者 陈鲁生 符方伟 《通信学报》 EI CSCD 北大核心 2002年第11期118-121,共4页
基于Schnorr签名,提出了一种适用于数字移动通信系统的用户身份认证方案。 该方案能实现双方相互认证,抵抗各种攻击(包括网内攻击)。在用户端引入预计算,减少了用户端的计算量,满足了移动通信的实时要求。 并对该方案的安全性及计算复... 基于Schnorr签名,提出了一种适用于数字移动通信系统的用户身份认证方案。 该方案能实现双方相互认证,抵抗各种攻击(包括网内攻击)。在用户端引入预计算,减少了用户端的计算量,满足了移动通信的实时要求。 并对该方案的安全性及计算复杂性进行了分析,得出了该方案是一个安全性高,计算复杂性低,符合数字移动通信系统要求的结论。 展开更多
关键词 数字移动通信系统 用户认证方案 SCHNORR签名
在线阅读 下载PDF
移动自组网中安全高效的组密钥管理方案 被引量:10
19
作者 王刚 温涛 +1 位作者 郭权 马学彬 《计算机研究与发展》 EI CSCD 北大核心 2010年第5期911-920,共10页
以提供安全、可靠的保密通信为目标的组密钥管理方案是移动自组网安全研究领域中的一个热点.然而,固有的动态性、资源受限和无固定基础设施等特点使得目前已有组密钥管理方案不能很好地适用于MANET.针对MANET组密钥管理面临的诸多挑战,... 以提供安全、可靠的保密通信为目标的组密钥管理方案是移动自组网安全研究领域中的一个热点.然而,固有的动态性、资源受限和无固定基础设施等特点使得目前已有组密钥管理方案不能很好地适用于MANET.针对MANET组密钥管理面临的诸多挑战,提出一种高效的安全组密钥管理方案(an efficient and secure group key management,ESGKM).ESGKM无需控制中心,所有成员通过协商共同生成组共享秘密密钥,提高了方案的安全性,并能很好地适应拓扑频繁变化的MANET环境.基于ECC和双线性对的密码体制提高了组密钥生成的效率,同时组成员能够对接收的子密钥份额和组密钥份额进行验证,进一步增加了方案的安全性.该方案还提出基于组密钥服务中心(group key ervice center,GKSC)的组密钥更新和一致性管理算法,有效减少了ESGKM通信开销和计算量,避免了组密钥不一致造成节点孤立.使用串空间模型对ESGKM方案进行了形式化分析,证明了其正确性和安全性.最后,通过与BD,A-GDH和TGDH协议比较,表明ESGKM能有效减少节点和网络资源消耗,很好地适用于动态的MANET环境,具有更为明显的性能优势. 展开更多
关键词 移动自组网 组密钥管理 秘密共享 椭圆曲线 认证
在线阅读 下载PDF
可防止欺诈的动态秘密分享方案 被引量:31
20
作者 张建中 肖国镇 《通信学报》 EI CSCD 北大核心 2000年第5期81-83,共3页
基于有限域上离散对数难解问题提出一个计算安全的动态秘密分享方案 ,本方案有效地解决了密钥的翻新与复用问题 ,其效率高且实用 ,特别是能检测伪子密 ,防止欺诈 ,且数据利用率较高。
关键词 动态秘密分享 信息安全 离散对象
在线阅读 下载PDF
上一页 1 2 9 下一页 到第
使用帮助 返回顶部