[1] |
Lamport L.Password authentication with insecure communication[J].Communications of the ACM,1981,24(11):770772.
|
[2] |
Hwang M S, Li L H. A new remote user authentication scheme using smart cards[J].IEEE Transactions on Consumer Electronics,2000,46(1):2830.
|
[3] |
ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms[C]∥Advances in Cryptology,1985:1018.
|
[4] |
Das M L,Saxena A,Gulati V P.A dynamic IDbased remote user authentication scheme[J].IEEE Transactions on Consumer Electronics,2004,50(2):629631.
|
[5] |
Hu Ronglei, Liu Jianwei, Zhang Qishan.Improvement of remote user authentication schemes using passwords[J].Journal of Beijing University of Aeronautics and Astronautics,2008,34(9):10371040.(in Chinese)
|
[6] |
Duan Xiaoyi,Zhang Qishan,Liu Jianwei.Improved security enhancement for dynamic IDbased remote user authentication scheme[J].Journal of Beijing University of Aeronautics and Astronautics,2007,33(5):565567.(in Chinese)
|
[7] |
Sonwanshi S S,Ahirwal R R,Jain Y K.An efficient smart card based remote user authentication scheme using hash function[C]∥2012 IEEE Students’ Conference on Electrical,Electronics and Computer Science (SCEECS),2012:14.
|
[8] |
Messerges T S,Dabbish E A,Sloan R H.Examining smartcard security under the threat of power analysis attacks[J].IEEE Transactions on Computers,2002,51(5):541552.
|
|
Table 3Comparison of authentication functions表3认证机制的功能对比方案双向
|
|
认证前向
|
|
安全性抗重放
|
|
攻击用户
|
|
匿名性智能卡权限
|
|
废除机制抗扮演
|
|
攻击时钟同步
|
|
问题抗已知
|
|
密钥攻击抗离线
|
|
猜测攻击原方案是是是否否否是是否Shin[13]
|
|
方案是是是是否是否是是Youngil[14]
|
|
方案是是是是是是是是是改进方案是是是是是是否是是[9]Tsai C S,Lee C C,Hwang M S.Password authentication schemes:Current status and key issues[J].International Journal of Network Security,2006,3(2):101115.
|
[10] |
Qin Xiaolong,Yang Yixian.Composite attacks on strongpassword authentication protocol[J].Acta Electronica Sinica,2003,31(7):10431045.(in Chinese)
|
[11] |
Li Li,Xue Rui,Zhang Huanguo,et al.Security analysis of authenticated key exchange protocol based on password [J].Acta Electronica Sinica,2005,33(1):166170.(in Chinese)
|
[12] |
Wang Ding,Ma Chunguang,Weng Chen,et al.Cryptanalysis and Improvement of a remote user authentication scheme for resource limited environment [J].Journal of Electronics &Information Technology,2012,34(10):25202526.(in Chinese)
|
[13] |
Shin S,Kim K,Kim K H,et al.A remote user authentication scheme with anonymity for mobile devices[J].International Journal of Advanced Robotic Systems,2012(9):17.
|
[14] |
Kim Y, Choi Y, Won D. Security improvement on smart cardbased remote user authentication scheme using Hash function[C]∥Proc of 2014 International Conference on Information Science and Applications (ICISA),2014:14.
|
|
附中文参考文献:
|
[5] |
胡荣磊,刘建伟,张其善.对一种远程用户口令认证方案的改进[J].北京航空航天大学学报,2008,34(9):10371040.
|
[6] |
段晓毅,张其善,刘建伟.基于动态 ID 的远程认证方案的改进[J].北京航空航天大学学报,2007,33(5):565567.
|
[10] |
秦小龙,杨义先.强口令认证协议的组合攻击[J].电子学报,2003,31(7):10431045.
|
[11] |
李莉,薛锐,张焕国,等.基于口令认证的密钥交换协议的安全性分析[J].电子学报,2005,33(1):166170.
|
[12] |
汪定,马春光,翁臣,等.一种适于受限资源环境的远程用户认证方案的分析与改进[J].电子与信息学报,2012,34(10):25202526.
|