[1]曹阳.多服务器环境下动态身份认证密钥协商方案[J].计算机技术与发展,2018,28(05):131-134.[doi:10.3969/ j. issn.1673-629X.2018.05.030]
 CAO Yang.Dynamic Identity Authentication Key Agreement Scheme under a Multi-server Environment[J].,2018,28(05):131-134.[doi:10.3969/ j. issn.1673-629X.2018.05.030]
点击复制

多服务器环境下动态身份认证密钥协商方案()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
28
期数:
2018年05期
页码:
131-134
栏目:
安全与防范
出版日期:
2018-05-10

文章信息/Info

Title:
Dynamic Identity Authentication Key Agreement Scheme under a Multi-server Environment
文章编号:
1673-629X(2018)05-0131-04
作者:
曹阳
陕西理工大学 数学与计算机科学学院,陕西 汉中 723000
Author(s):
CAO Yang
School of Mathematics and Computer Science,Shaanxi University of Technology,Hanzhong 723000,China
关键词:
多服务器ECC动态身份密钥协商
Keywords:
multi-serverECCdynamic identitykey agreement
分类号:
TP31
DOI:
10.3969/ j. issn.1673-629X.2018.05.030
文献标志码:
A
摘要:
为了提高远程用户利用网络从不同服务器访问时身份认证的安全性,基于 ECC 密码体制及离散对数问题的难解性,利用 hash 函数的单向性,结合用户身份、口令提出了一种多服务器环境下动态身份认证密钥协商方案。 该方案使用hash 函数隐藏用户口令、身份,信息发送都是在安全信道上发送,由注册阶段、登录阶段、认证密钥协商阶段、口令更改阶段四个部分组成。 注册时用户 U i 向注册中心 RC 传送的是匿名身份;登录时用户 U i 的身份是动态身份,实现了用户的强匿名性;密钥协商时实现了可信注册中心 RC、服务器 S j 及用户 U i 三方相互认证。 分析表明,方案具有抗重放攻击、抗伪造攻击、抗恶意合法用户攻击、三方认证、强匿名性等安全性。
Abstract:
In order to improve the security of remote users’ identity authentication with network to visit from different servers,based on ECC cryptography and the intractability of discrete logarithmic,with the one-way hash function,we propose a dynamic identity authentication key agreement scheme under a multi-server environment combined with the users’ identity and password. It takes advantage of hash function to hide the user’s password and identity. Message routing is completed through secure channel,consisting of register stage,
login stage,authentication key agreement stage and password change stage. User U i sends an anonymous identity to the registry when registering. In logging,the identity of user U i is dynamic,which realizes the user’s strong anonymity. In key agreement,a three-party mutual authenticationis completed among a reliable registry RC, S j server and user U i . The analysis shows that the scheme has such security features as resisting replay attacks,resisting forgery attack,anti-malicious legal user attacks,three-party authentication proposed,and strong anonymity.

相似文献/References:

[1]杨剑 杨铭熙 李腊元.增强安全性的IEEE802.15.4协议研究[J].计算机技术与发展,2007,(12):136.
 YANG Jian,YANG Ming-xi,LI La-yuan.Research of Security Enhanced IEEE802.15.4 Protocol[J].,2007,(05):136.
[2]郝伟伟,吕 磊.基于模糊提取技术的多服务器身份验证协议[J].计算机技术与发展,2022,32(05):75.[doi:10. 3969 / j. issn. 1673-629X. 2022. 05. 013]
 HAO Wei-wei,LYU Lei.Multi Server Authentication Protocol Based on Fuzzy Extraction Technology[J].,2022,32(05):75.[doi:10. 3969 / j. issn. 1673-629X. 2022. 05. 013]

更新日期/Last Update: 2018-07-05