首页 | 官方网站   微博 | 高级检索  
     

基于MYK-NTRUSign签名的用户认证方案
引用本文:张利华,朱成九,郭 强,范晓红,吕善伟.基于MYK-NTRUSign签名的用户认证方案[J].计算机工程,2007,33(13):179-181.
作者姓名:张利华  朱成九  郭 强  范晓红  吕善伟
作者单位:[1]北京航空航天大学电子信息学院,北京100083 [2]华东交通大学电气与电子学院,南昌330013 [3]北京电子科技学院电子学院,北京100700
摘    要:基于修复了延展性缺陷的NTRUSign算法,给出了一个使用智能卡的远程用户认证方案。该方案的安全性是基于单向Hash函数和在有限时间在大维数格计算最短向量的困难性。该方案包括4个阶段:注册阶段,登陆阶段,认证阶段和更改口令阶段。允许用户自主选择并更改口令,实现了双向认证;能够抵御中间人攻击,抗DoS攻击,具备前向安全性、强安全修复性和“黑名单”拒绝服务机制。是一个低开销、强安全性的方案。

关 键 词:身份认证  口令  智能卡  NTRUSign  延展性
文章编号:1000-3428(2007)13-0179-03
修稿时间:2006-08-21

MYK-NTRUSign Signature Based User Authentication Scheme
ZHANG Lihua,ZHU Chengjiu,GUO Qiang,FAN Xiaohong,LV Shanwei.MYK-NTRUSign Signature Based User Authentication Scheme[J].Computer Engineering,2007,33(13):179-181.
Authors:ZHANG Lihua  ZHU Chengjiu  GUO Qiang  FAN Xiaohong  LV Shanwei
Affiliation:1. School of Electronic and Information Engineering, Beijing University of Aeronautics and Astronautics, Beijing 100083; 2. School of Electric and Electronic Engineering, East China Jiaotong University, Nanchang 330013; 3. School of Electronic Engineering, Beijing Electronic Science and Technology Institute, Beijing 10070
Abstract:A new remote user authentication scheme using smart cards and a NTRUSign signature scheme against Malleability weak are proposed.The security of the scheme relies on Hash function and the fact that for most lattices,it is very difficult to find extremely short vectors.The scheme has four phases: registration phase,login phase,authentication phase and password change phase.Furthermore,the scheme has many merits: it let users freely choose and change password at their own will;it provides mutual authentication between two entities;it has more lower computational costs;it resists man-in-middle attack and denial of service attack.In addition,it has forward security and strong security reparability,as well as black list eviction mechanism.In a word,the proposed scheme is a better scheme with lower cost and strong security.
Keywords:authentication  password  smart cards  NTRUSign  malleability
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号