期刊文献+

基于混沌映射和模糊提取器的身份验证方案 被引量:3

Authenticated scheme based on chaotic map and fuzzy extractor
在线阅读 下载PDF
导出
摘要 为研究安全保密程度高且轻量级的身份验证方案,在Chebyshev混沌映射和模糊提取器的基础上,提出一种多服务器身份验证方案。利用模糊提取器理念,准确实现生物特征模式匹配;为进一步改善用户匿名性和不可追踪性,使用Chebyshev混沌映射建立包含前向保密性的会话密钥。BAN逻辑证明了提出方案的准确性。与其它同类优秀方案比较,提出方案在身份验证的保密性和安全性方面更优,时间复杂度适中,更加适用于多服务器环境。 To study a high security and lightweight authentication scheme,on the basis of Chebyshev chaotic map and fuzzy extractor,an authenticated scheme for multi-server environments was proposed.The concept of fuzzy extractor was used to provide the proper matching of biometric patterns.Chebyshev chaotic map was used to establish session key with forward secrecy property,to further improve the user anonymity and traceability.Through BAN-logic-based formal security analysis,the correctness of the proposed scheme was proved.Compared with other schemes,the proposed scheme is better in privacy and security of authentication with moderate time-complexity,which possesses higher usability in real multi-server environments.
作者 张萌 刘秋红 宫继兵 ZHANG Meng;LIU Qiu-hong;GONG Ji-bing(Department of Electronic Information, Tangshan Polytechnic College, Tangshan 063299, China;College of Information Science and Engineering, Yanshan University, Qinhuangdao 066004, China)
出处 《计算机工程与设计》 北大核心 2018年第12期3655-3660,3673,共7页 Computer Engineering and Design
基金 河北省自然科学基金青年基金项目(F2014203099) 2017年度唐山市科技计划基金项目(17140212a)
关键词 Chebyshev混沌映射 模糊提取器 身份验证 BAN逻辑 多服务器环境 Chebyshev chaotic map fuzzy extractor authentication BAN logic multi-server environments
  • 相关文献

参考文献8

二级参考文献100

  • 1Menezes A, van Oorschot P, Vanstone S. Handbook of Applied Cryptography[M]. New York, USA: CRC Press, 1996.
  • 2Nessett D M. Factors Affecting Distributed System Security[J]. IEEE Transactions on Sol, ware Engineering, 1987, SE-13(2): 233-248.
  • 3Schneier B. Why Cryptography Is Harder than It Looks[J]. Information Security Bulletin, 1997, 2(2): 31-36.
  • 4Dolev D, Yao Chi-Chih. On the Security of Public Key Protocols[J]. IEEE Transactions on Information Theory, 1983, 29(2): 198-208.
  • 5Nessett D. A Critique of the Burrows, Abbadi and Needham Logic[J]. Operating Systems Review, 1990, 24(2): 35-38.
  • 6Burrows M, Abadi M, Needham R. A Logic of Authentication[J]. ACM Transactions on Computer Systems, 1990, 8(I): 18-36.
  • 7Gong Li, Needham R, Yahalom R. Reasoning About Belief in Cryptographic Protocols[C]//Proceedings of IEEE Symposium on Research in Security and Privacy. [S. 1.]: IEEE Press, 1990: 234-248.
  • 8Cohen M, Dam M. A Completeness Result for BAN Logic[EB/OL]. [2011-06-22]. http://www.access.ee.kth.se/reports/2007/13.pdf.
  • 9Abdelmajid N T, Hossain M A. Improved Kerberos Security Protocol Evaluation Using Modified BAN Logic[C]//Proc. of the 10th International Conference on Computer and Information Technology. [S. 1.]: IEEE Press, 2010: 1610-1615.
  • 10Abadi M, Tuttle M. A Semantics for a Logic of Authentication[C]// Proc. of the 10th Annual ACM Symposium on Principles of Distributed Computing. [S. 1.]: ACM Press, 1991 : 201-216.

共引文献41

同被引文献32

引证文献3

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部