(3.236.214.19) 您好!臺灣時間:2021/05/10 08:07
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:粘為亙
研究生(外文):Wei-ken Nien
論文名稱:雙線性配對在安全且有效率的使用者認證與金鑰協商之研究
論文名稱(外文):A Study on Secure and Efficient User Authentication and Key Agreement Using Bilinear Pairings
指導教授:莊文勝莊文勝引用關係
指導教授(外文):Wen-Shenq Juang
學位類別:碩士
校院名稱:世新大學
系所名稱:資訊管理學研究所(含碩專班)
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2008
畢業學年度:96
語文別:英文
論文頁數:52
中文關鍵詞:使用者認證會議金鑰協商雙線性配對智慧卡
外文關鍵詞:User authenticationSession key agreementBilinear pairingsSmart cards
相關次數:
  • 被引用被引用:0
  • 點閱點閱:155
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:1
  • 收藏至我的研究室書目清單書目收藏:0
為提供安全的分散式電腦環境,有效率且彈性的使用者認證與金鑰協商是非常重要的。為提供此安全環境,我們提出利用雙線性配對達到有效率且彈性的使用者認證及金鑰協商方案。雙線性配對的優點在於擁有較短的金鑰長度,其不需要較大的儲存空間與擁有較短的運算時間。
我們設計的協定可以運用在兩方與三方的環境中,其主要的優點包含:(1)在伺服器內不需要存有任何密碼表或驗證表;(2) 使用者可以自由選擇或變更他們自己的密碼;(3) 伺服器與使用者彼此可以相互認證;(4) 使用者與伺服器可以產生會議金鑰;(5) 沒有時間同步的問題;(6) 即使存在智慧卡內的秘密資訊被偷導致洩漏,也可以防止離線式字典攻擊;(7) 在三方環境中可以防止伺服器入侵的問題。
For providing a secure distributed computer environment, efficient and flexible user authentication and key agreement is very important. For providing this security mechanism, we propose efficient and flexible password authenticated key agreement schemes using bilinear pairings. The major advantage for using bilinear pairings is the shorter key length with the same security. It can provide less storage space and computation time.
For providing the security mechanisms in different environments, we design security protocols in two-party and three party setting. The main merits in our proposed schemes include: (1) there does not need any password or verification table in the server; (2) users can choose or change his own password freely; (3) both of the server and a user can authenticate each other; (4) the user and the server can generate a session key; (5) it does not have a serious synchronization-clock problem; (6) even if the secret information stored in a smart card is compromised, it can prevent the offline dictionary attack; (7) it can prevent the server compromise in our three-party protocol.
Table of Contents
Abstract in Chinese II
Abstract in English III
Acknowledgement IV
Table of Contents V
List of Figures VII
List of Tables VIII
Chapter 1.Introduction 1
Chapter 2.Background 5
2.1 One-way hash functions 5
2.2 Asymmetric cryptosystems 6
2.3 Symmetric cryptosystems 7
2.4 Diffie-Hellman key agreement protoco l9
2.5 Bilinear pairing 10
Chapter 3.Review of relate works 12
3.1 Das et al.’s scheme 12
3.1.1 The setup phase 12
3.1.2 The registration phase 13
3.1.3 The authentication phase 13
3.1.4 The password changing phase 14
3.2 Weaknesses of the Das et al.’s scheme 15
3.2.1 Suffering the replay attack 15
3.2.2 Suffering the offline dictionary attack without or with the smart card 16
3.2.3 Suffering the insider attack 17
3.2.4 Poor reparability 17
3.3 Kwon et al.’s scheme 17
3.3.1 Initial Setup 17
3.3.2 Protocol 18
Chapter 4.Our proposed schemes 21
4.1 Our proposed two-party scheme 21
4.1.1 The setup phase 21
4.1.2 The registration phase 21
4.1.3 The login phase 23
4.1.4 The password changing phase 24
4.1.5 Security analysis 25
4.1.6 Performance considerations 27
4.2 Our proposed three-party scheme 30
4.2.1 The setup phase 31
4.2.2 The registration phase 31
4.2.3 Protocol 32
4.2.4 Relay mode protocol 35
4.2.5 Security analysis 36
4.2.6 Performance considerations 39
Chapter 5.Conclusions and future works 41
Bibliography 42
[1] S. Bellovin and M. Merritt, "Augmented encrypted key exchange: password-based protocols secure against dictionary attacks," Research in Security and Privacy, Proceedings IEEE Computer Society Symposium, pp. 72-84, 1992.
[2] S. Bellovin and M. Merritt, "Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password-file compromise," ACM Conference on Computer and Communications Security, pp. 244-250, 1993.
[3] D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Proc. Crypto 2001, LNCS, vol. 2139, Springer, pp. 213-229, 2001.
[4] M. Das, A. Saxena, V. Gulati, and D. Phatak, "A novel remote user authentication scheme using bilinear pairings," Computers & Security, vol.25, pp. 184-189, 2006.
[5] C. Fan, Y. Chan, and Z. Zhang, "Robust remote authentication scheme with smart cards," Computers & Security, vol. 24, pp. 619-628, 2005.
[6] L. Gong, "Optimal authentication protocol resistant password guessing attack," Proc. 8th IEEE Computer Security Foundations Workshop, pp. 24-29, 1995.
[7] L. Gong, M. Lomas, R. Needham, and J. Saltzer, "Protecting poorly chosen secrets from guessing attacks," IEEE J. Sel. Areas Commun., vol. 11, pp. 648-656, 1993.
[8] T. Hwang and W. Ku, "Repairable key distribution protocols for internet environments," IEEE Trans. on Communications, vol. 43, pp. 1947-1950, 1995.
[9] A. Joux, "A one round protocol for tripartite Diffie-Hellman," Proceedings of the 4th International Symposium on Algorithmic Number Theory, Lecture Notes In Computer Science vol. 1838, pp. 385-394, 2000.
[10] W. Juang, "Efficient password authenticated key agreement using smart card," Computer & Security, vol. 23, pp. 167-173, 2004.
[11] W. Ku, "A hash-based strong-password authentication scheme without using smart cards," ACM Operating Systems Review, vol. 38, pp. 29-34, 2004.
[12] W. Ku and S. Chen, "Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards," IEEE Trans. on Consumer Electronics, vol. 50, pp. 204-207, 2004.
[13] W. Ku, C. Chen, and H. Lee, "Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme," ACM Operating Systems Review, vol. 37, pp. 9-25, 2003.
[14] W. Ku, C. Chen, and H. Lee, "Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme," IEICE Trans. on Commun., vol. E86-B, pp. 1682-1684, 2003.
[15] T. Kwon and D. H. Lee, "Three-party password authenticated key agreement resistant to server compromise," Information Security Applications, Lecture Notes in Computer Science, vol. 4298, pp. 312-323, 2007.
[16] T. Kwon, M. Kang, S. Juang, and J. Song, "An improvement of the password-based authentication protocol on security against replay attacks," IEICE Trans. on Commun., vol. E82-B, pp. 991-997, 1999.
[17] L. Lamport, "Password authentication with insecure communication," Communications of ACM, vol. 24, pp. 28-30, 1981.
[18] S. Lang, "Elliptic functions," Addison-Wesley, Reading, pp. 243-245, 1973.
[19] C. Lee, L. Li, and M. Hwang, "A remote user authentication scheme using hash functions," ACM Operating Systems Review, vol. 36, pp. 23-29, 2002.
[20] C. Lin, H. Sung, and T. Hwang, "Three-party encrypted key exchange: Attacks and a solution," ACM Operating Syst. Rev., vol. 34, pp. 12-20, 2000.
[21] NIST_FIPS_PUB_46-3, "Data Encryption Standard (DES)," National Institute of Standards and Technology, U. S. Department of Commerce, 1999.
[22] NIST_FIPS_PUB_180-2, "Secure Hash Standard," National Institute of Standards and Technology, U. S. Department of Commerce, DRAFT, 2004.
[23] NIST_FIPS_PUB_197, "Announcing the ADVANCED ENCRYPTION STANDARD (AES)," National Institute of Standards and Technology, U. S. Department of Commerce, 2001.
[24] M. Peyravian and N. Zunic, "Methods for protecting password transmission," Computers & Security, vol. 19, pp. 466-469, 2000.
[25] R. Rivest, "The MD5 Message-Digest Algorithm," IETF RFC 1321, April, 1992.
[26] K. Shim, "Efficient one round tripartite authenticated key agreement protocol from Weil pairing," Electron. Lett., vol. 38, pp. 630-632, 2002.
[27] A. Shimizu, T. Horioka, and H. Inagaki, "A password authentication method for contents communication on the Internet," IEICE Transactions on Communications, vol. E81-B, pp. 1666-1673, 1998.
[28] N. Smart, "Identity-based authenticated key agreement protocol based on Weil pairing," Electron. Lett., vol. 39, pp. 208-209, 2003.
[29] M. Steiner, G. Tsudik, and M. Waidner, "Refinement and extension of encrypted key exchange," ACM Operating Syst. Rev., vol. 29, pp. 22-30, 1995.
[30] H. A. Wen, T. F. Lee, and T. Hwang, "Provably secure three-party password-based authenticated key exchange protocol using Weil pairing," IEE Proceedings -- Communications, vol. 152, pp. 138-143, 2005.
[31] X. Yi, "Efficient id-based key agreement protocol from weil pairing," Electron. Lett., vol. 39, pp. 206-208, 2003.
電子全文 電子全文(本篇電子全文限研究生所屬學校校內系統及IP範圍內開放)
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊
 
系統版面圖檔 系統版面圖檔