计算机应用 ›› 2014, Vol. 34 ›› Issue (7): 1867-1870.DOI: 10.11772/j.issn.1001-9081.2014.07.1867

• 计算机安全 • 上一篇    下一篇

基于智能卡的远程用户匿名身份认证和密钥协商方案

刘莎1,朱淑华2,3   

  1. 1. 暨南大学 信息科学技术学院,广州 510632;
    2. 中山大学 信息科学与技术学院,广州 510006;
    3. 暨南大学 网络与教育技术中心,广州 510632
  • 收稿日期:2013-12-31 修回日期:2014-03-01 出版日期:2014-07-01 发布日期:2014-08-01
  • 通讯作者: 刘莎
  • 作者简介:刘莎(1989-),女,湖南郴州人,硕士研究生,主要研究方向:信息安全、密码学应用;朱淑华(1969-),女,四川广元人,高级工程师,博士研究生,CCF高级会员,主要研究方向:计算机网络、云计算安全。
  • 基金资助:

    国家自然科学基金资助项目;广东省产学研及科技计划项目;广东高校工程研究中心专项;广州市科技计划项目

Anonymity-preserving remote user password authentication with key agreement scheme based on smart cards

LIU Sha1,ZHU Shuhua2,3   

  1. 1. School of Information Science and Technology, Jinan University, Guangzhou Guangdong 510632, China;
    2. School of Information Science and Technology, Sun Yat-Sen University, Guangzhou Guangdong 510006, China;
    3. Network and Educational Technology Center, Jinan University, Guangzhou Guangdong, 510632, China
  • Received:2013-12-31 Revised:2014-03-01 Online:2014-07-01 Published:2014-08-01
  • Contact: LIU Sha

摘要:

分析了Li-Niu等(LI X, NIU J W, KHAN M K, et al. An enhanced smart card based remote user password authentication scheme[J]. Journal of Network and Computer Applications, 2013, 36(5):1365-1371.)基于智能卡的远程用户登录认证方案,指出了方案中存在的安全性问题,并提出了改进方案。新方案利用一种自认证的时间戳技术,与对称加密技术相结合,解决了多数智能卡方案中存在的时钟同步问题。与Li-Niu方案相比,新方案不仅可以提供用户的匿名登录,而且能够抵抗扮演攻击和内部攻击,适用于复杂的网络环境。

Abstract:

The paper firstly analyzed some security problems in Li-Niu's (LI X, NIU J W, KHAN M K, et al. An enhanced smart card based remote user password authentication scheme[J]. Journal of Network and Computer Applications, 2013, 36(5):1365-1371.) enhanced smart card based remote user password authentication scheme, and then proposed a novel smart-card-based scheme. In new scheme, a self-verified timestamp technique was combined with symmetric encryption methods to solve the problem of implementing clock synchronization in most typical smart-card-based schemes. Compared with Li-Niu's scheme, this scheme can not only provide the users' anonymity, but also resist the impersonation attacks and the privileged insider attacks. The scheme is more secure and efficient for the complicated network environment.

中图分类号: