共查询到19条相似文献,搜索用时 62 毫秒
1.
2.
3.
4.
利用通信双方密码设备的身份特征和共享密钥,提出了一种基于身份认证的密钥协商模型,采用与时间戳机制相绑定的分组密码算法、杂凑算法加密体制,定义了密码设备进行密钥协商的工作流程,按此流程进行双方通信密钥的按需协商以及共享密钥的实时有效更新,保证了密钥协商过程的机密性、完整性、防重放性和不可预测性,为某些应用模式下密码设备的安全密钥交换提供了一种有效实用的技术手段。 相似文献
5.
现有会话密钥可托管的ID-AKA(IDentity-based Authenticated Key Agreement)协议要么存在已知安全缺陷,要么是在随机预言模型下可证明安全.基于Boneh等人定义的安全陷门函数,提出一种会话密钥可托管的ID-AKA协议.在ID-BJM模型基础上,扩展定义了ID-AKA协议分析的标准安全模型.扩展模型将安全游戏划分为两个阶段,去除了随机预言机,能完备地模拟不同类型敌手的行为.在扩展模型下,新协议的安全性被规约为多项式时间敌手求解判定性BDH(Bilinear Diffie-Hellman)难题和判定性BDHI(Bilinear Diffie-Hellman Inversion)难题,具有可证明安全性. 相似文献
6.
针对ZigBee节点组网时缺乏身份认证,密钥分配安全性不足的问题,该文提出一种基于身份的无双线性对运算的ZigBee节点身份认证及密钥分配方案。该方案继承了基于身份的认证方案的优点,在实现身份认证的同时完成了ZigBee密钥分配过程,具有较高的安全性和可扩展性。实验结果表明,该文方案具有存储开销小、能耗低等优势。 相似文献
7.
8.
9.
针对用户对高安全性移动存储设备的迫切需求和现有的各类USB安全载体的不足,提出了一种集身份认证、存储数据加密、存储数据安全管理等功能于一体的高安全性uSB密钥载体的设计方案.首先从总体上描述了载体的结构组成和工作原理,然后具体介绍了各关键模块的设计与实现情况.方案中所采用的双重访问控制机制和基于FPGA的硬件加密逻辑结构,从安全性、可升级性和运算速度方面大大增强了载体的性能. 相似文献
10.
11.
12.
13.
基于单点登录技术,构建一个统一身份认证服务平台,有效地整合校园网络中所有的应用系统和资源为目的。采用模块化的方法对系统各个功能模块进行详细设计,然后采用MyEclispe开发平台、tomcat 5.5为服务器、J2EEWeb设计语言、MVC开发模式实现本系统,结合统一身份认证系统整体设计思想,设计统一身份认证系统。实现用户的一次登录,可以访问整合校园网络中所有系统和资源。提高系统管理效率和安全性。 相似文献
14.
用户在接入网络和使用网络服务时,过多的账号对身份认证、授权和计费(AAA)带来不便,并且许多网络服务提供商因没有合适的AAA手段而发展受限。针对上述问题,提出智能AAA的方案,设计了智能AAA的结构,并采用了基于SOAP的安全断言(SAML)来解决智能AAA与其它服务提供商信息交互的问题,最后给出了完整的身份认证流程。分析表明,智能AAA可以对用户的认证、授权和计费做到统一智能管理,为用户和网络服务商带来很大的便利。 相似文献
15.
16.
In traditional face authentication system,the trait template and authentication request were generally matched over plaintext,which may lead to the leakage of users’ sensitive data.In order to address the above-mentioned problem,based on matrix encryption,an efficient and privacy-preserving online face authentication scheme was proposed.Specifically,the users’ face trait template for register and the authentication request were encrypted before being sent to the online authentication server,and the similarity computation between the encrypted face trait template and authentication request was computed by the online authentication server over ciphertexts,which guaranteed the security of users’ sensitive data without affecting the accuracy of face authentication.Security analysis shows that the proposed scheme can achieve multiple security levels according to different security parameters.Moreover,performance evaluation shows that the proposed scheme has low computation cost and communication overhead.Experiments results demonstrate the high efficiency of the proposed scheme,which can be implemented in the real environment effectively. 相似文献
17.
A robust and efficient dynamic identity‐based multi‐server authentication scheme using smart cards 下载免费PDF全文
Chin‐Chen Chang Ting‐Fang Cheng Wei‐Yuan Hsueh 《International Journal of Communication Systems》2016,29(2):290-306
In single‐server architecture, one service is maintained by one server. If a user wants to employ multiple services from different servers, he/she needs to register with these servers and to memorize numerous pairs of identities and passwords corresponding to each server. In order to improve user convenience, many authentication schemes have been provided for multi‐server environment with the property of single registration. In 2013, Li et al. provided an efficient multi‐server authentication scheme, which they contended that it could resist several attacks. Nevertheless, we find that their scheme is sensitive to the forgery attack and has a design flaw. This paper presents a more secure dynamic identity‐based multi‐server authentication scheme in order to solve the problem in the scheme by Li et al. Analyses show that the proposed scheme can preclude several attacks and support the revocation of anonymity to handle the malicious behavior of a legal user. Furthermore, our proposed scheme has a lower computation and communication costs, which make it is more suitable for practical applications. Copyright © 2014 John Wiley & Sons, Ltd. 相似文献
18.
用归一化灰度组合法进行图像匹配 总被引:6,自引:0,他引:6
归一化灰度组合法是基于灰度组合矩阵的一种灰度相关法,主要利用相似图像间像素灰度组合应该最少的原理进行图像匹配。它可以统一地表示其它灰度相关法,解决了相关法对噪声和灰度变化敏感的问题。算法中主要涉及整数运算,与其它相关法相比,运算速度更快,并且可以通过灰度量化使归一化灰度组合法速度更快,匹配度更高、匹配唯一性更好。实验表明减少灰度量化级数不影响图像匹配值的大不。 相似文献
19.
Smart card‐based client‐server authentication protocol is well popular for secure data exchange over insecure and hostile networks. Recently, Lee et al. put forward an authentication protocol by utilizing ElGamal cryptosystem and proved that it can withstand known security threats. This article evinces that the protocol of Lee et al. is unwilling to protect various important security vulnerabilities such as forgery attack and off‐line password‐guessing attack. To vanquish these loopholes, this article presents a robust authentication protocol for client‐server communication over any insecure networks. The security explanation of our protocol has done through the formal and informal mechanism and its outcome makes sure that the designed protocol is strong enough to resist the known vulnerabilities. In addition, we have simulated our protocol using ProVerif online software and its results certify that our protocol is safe against private information of the client and server. This paper also has made performance estimation of the presented protocol and others, and the outcome favors the presented protocol. 相似文献