Remote user authentication in distributed networks and systems

作者: Jiangshan Yu

DOI:

关键词:

摘要: Entity authentication is becoming more and important. With widespread use of distributed computer networks, for example, cellular virtual reality communities, World Wide Web, peer-to-peer networks multiplayer online games, there a need to be vigilant about the security privacy users. One way address concerns remote user this widely used in systems identifying users servers. Remote means verifying whether has permission access network services resources. However, an attacker may impersonate server communicate with then, able steal user’s information. Thereafter, can pass real by using stolen information user. Therefore, mutual needed order prevent bogus attacks. Other requirements include ensuring confidentiality further exchanging messages, protecting privacy, providing anonymity achieving unlinkability. In complex environments however, it challenge design efficient secure protocols under such requirements. The research reported here aims provide identification networks. general, require three factors, i.e., password, smart card biometric characteristics. which based on password called password-based authentication. Password-based together another factor, card, two-factor which, successful achieved if correct corresponding card. biometric-based mainly characteristics, finger print, iris scan face, also three-factor consists

参考文章(87)
Vincent Rijmen, Joan Daemen, Rijndael for AES. AES Candidate Conference. pp. 343- 348 ,(2000)
Ronald L. Rivest, Silvio Micali, Shafi Goldwasser, A "Paradoxical" Solution to the Signature Problem (Extended Abstract) foundations of computer science. pp. 441- 448 ,(1984)
Silvio Micali, Shafi Goldwasser, Charles Rackoff, The Knowledge Complexity of Interactive Proof-Systems (Extended Abstract) symposium on the theory of computing. pp. 291- 304 ,(1985)
Mihir Bellare, Oded Goldreich, On Defining Proofs of Knowledge international cryptology conference. pp. 390- 420 ,(1992) , 10.1007/3-540-48071-4_28
Emmanuel Bresson, Olivier Chevassut, David Pointcheval, New Security Results on Encrypted Key Exchange public key cryptography. pp. 145- 158 ,(2004) , 10.1007/978-3-540-24632-9_11
Eun-Jun Yoon, Woo-Hun Kim, Kee-Young Yoo, Security Enhancement for Password Authentication Schemes with Smart Cards Trust, Privacy, and Security in Digital Business. pp. 311- 320 ,(2005) , 10.1007/11537878_31
Mihir Bellare, Phillip Rogaway, Entity authentication and key distribution international cryptology conference. pp. 232- 249 ,(1993) , 10.1007/3-540-48329-2_21
Mihir Bellare, Phillip Rogaway, Optimal asymmetric encryption theory and application of cryptographic techniques. pp. 92- 111 ,(1994) , 10.1007/BFB0053428
D. Boneh, TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM Notices of the American Mathematical Society. ,vol. 46, pp. 203- 212 ,(1999)