首页 | 官方网站   微博 | 高级检索  
     

基于视觉密码的身份认证方案
引用本文:冯国柱,李超,吴翊.基于视觉密码的身份认证方案[J].计算机应用,2006,26(10):2318-2319.
作者姓名:冯国柱  李超  吴翊
作者单位:国防科技大学理学院应用数学与系统科学系
基金项目:国家自然科学基金;国家重点实验室基金
摘    要:基于视觉密码体制构造了一个高效、可靠的身份认证方案。在方案中仅仅使用了视觉密码和消息认证码两个密码组件,在不降低安全性的前提下,有效地避开了传统密码的缺点。方案中为认证服务器引入了条形码图像作为机密图像,有效地降低了服务器对图像中机密信息自动识别的难度和复杂度,使得方案更加有效、实用。最后对方案的安全性进行分析,说明方案可有效抵抗常见的攻击。

关 键 词:认证    视觉密码    条形码    消息认证码
文章编号:1001-9081(2006)10-2318-02
收稿时间:2006-04-26
修稿时间:2006-04-26

Novel authentication scheme based on visual cryptography
FENG Guo-zhu,LI Chao,WU Yi.Novel authentication scheme based on visual cryptography[J].journal of Computer Applications,2006,26(10):2318-2319.
Authors:FENG Guo-zhu  LI Chao  WU Yi
Affiliation:1 Department of Mathematics and System Science, National University Defense Technology, Changsha Hunan 410073, China; 2. State Key Laboratory of Mobile Communication, Southeast University, Nanjing Jiangsu 210096, China
Abstract:An efficient and credible authentication schema was constructed based on the visual cryptography. It avoided the disadvantages of traditional cryptography by adopting only two cryptography components: visual cryptography and MAC, and the safety has not been lowered down. Bar code was introduced into this schema as secret image to reduce the complexity and difficulty of the server's auto-recognition of secret information which was hidden in images, so that made the schema more efficient. In the end of this paper, we analyzed the schema's safety, and the result showed that the new schema can resist common attack effectively.
Keywords:authentication  visual cryptography  bar cede  MAC
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号