首页 | 官方网站   微博 | 高级检索  
     

格上基于智能卡的安全口令认证方案
引用本文:赵宗渠,郭小杰,叶青,殷明辉,汤永利.格上基于智能卡的安全口令认证方案[J].计算机应用研究,2021,38(9):2831-2836.
作者姓名:赵宗渠  郭小杰  叶青  殷明辉  汤永利
作者单位:河南理工大学 计算机科学与技术学院,河南 焦作454000
基金项目:国家自然科学基金资助项目(61802117);河南省高校科技创新团队支持计划资助项目(20IRTSTHN013);“河南省网络密码技术重点实验室”开放课题(LNCT2019-A04);河南省高等学校重点科研项目(19A520025)
摘    要:基于智能卡的认证方案是一种高效且常用的认证机制,但安全性基于数论难题构建的相关认证方案存在不能抵抗量子攻击、恶意读卡器攻击等问题.提出一种新的格上基于智能卡的口令认证方案,该方案利用格密码中近似平滑投射哈希函数和可拆分公钥密码体制,通过用户口令和智能卡完成与服务器的身份认证和会话密钥协商.该方案在随机预言模型下满足理论可证明安全,在抵抗量子攻击、恶意读卡器攻击和其他类型攻击方面有较高的可靠度.仿真实验表明,所提方案执行效率高,满足实际应用需求.

关 键 词:身份认证  智能卡  格密码  量子攻击
收稿时间:2020/11/26 0:00:00
修稿时间:2021/8/10 0:00:00

Security password authentication scheme based on smart CARD from lattices
Zhao Zongqu,Guo Xiaojie,Ye Qing,Yin Minghui and Tang Yongli.Security password authentication scheme based on smart CARD from lattices[J].Application Research of Computers,2021,38(9):2831-2836.
Authors:Zhao Zongqu  Guo Xiaojie  Ye Qing  Yin Minghui and Tang Yongli
Affiliation:College of Computer Science and Technology, Henan Polytechnic University,,,,
Abstract:The authentication scheme based on smart card is an efficient and commonly used authentication mechanism, but most of the existing schemes whose security depends on the number theoretical hard problem can not resist quantum attacks and malicious card reader attacks. This paper proposed a novel password authentication scheme from lattices, which utilized an approximate smooth projective hash function and a splittable public-key encryption scheme in the lattice-based cryptosystem. It completed identity authentication and secure session key agreement between the server and user by password and smart card. The scheme satisfied the theoretical provably security in random oracle model. It had high reliability in resisting quantum attacks, malicious card reader attacks and other types of attacks. Simulation experiments show that the proposed scheme has high execution efficiency and meets the requirements of practical application.
Keywords:identity authentication  smart card  lattices cryptography  quantum attack
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机应用研究》浏览原始摘要信息
点击此处可从《计算机应用研究》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号