Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme

被引:10
作者
Li, Xiong [1 ,2 ]
Niu, Jianwei [2 ]
Khan, Muhammad Khurram [3 ]
Wang, Zhibo [4 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[2] Beihang Univ, State Key Lab Software Dev Environm, Beijing 100191, Peoples R China
[3] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh 11653, Saudi Arabia
[4] E China Inst Technol, Coll Software, Nanchang 330013, Peoples R China
基金
中国国家自然科学基金;
关键词
PASSWORD AUTHENTICATION; SMART-CARD; EFFICIENT; KEY; IDENTIFICATION; CRYPTANALYSIS; IMPROVEMENT; WEAKNESSES; SECURITY; PROTOCOL;
D O I
10.1155/2013/910409
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
We apply LU decomposition of matrices to present an anonymous bilateral authentication scheme. This paper aims at improving security and providing more excellent performances for remote user authentication scheme. The proposed scheme can provide bilateral authentication and session key agreement, can quickly check the validity of the input password, and can really protect the user anonymity. The security of the proposed scheme is based on the discrete logarithm problem (DLP), Diffie- Hellman problem (DHP), and the one- way hash function. It can resist various attacks such as insider attack, impersonation attack, server spoofing attack, and stolen smart card attack. Moreover, the presented scheme is computationally efficient for real-life implementation.
引用
收藏
页数:10
相关论文
共 31 条
[1]  
Cheng L. M., 1998, COMPUT SECUR, V21, P74
[2]  
Choi SJ, 2004, LECT NOTES COMPUT SC, V3046, P637
[3]   Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards [J].
Hsiang, Han-Cheng ;
Shih, Wei-Kuan .
COMPUTER COMMUNICATIONS, 2009, 32 (04) :649-652
[4]  
Jeong H, 2010, J INF SCI ENG, V26, P1845
[5]  
Jung H, 2011, LECT NOTES COMPUT SC, V6786, P593, DOI 10.1007/978-3-642-21934-4_48
[6]  
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
[7]   Further cryptanalysis of fingerprint-based remote user authentication scheme using smartcards [J].
Ku, WC ;
Chang, ST ;
Chiang, MH .
ELECTRONICS LETTERS, 2005, 41 (05) :240-241
[8]   Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards [J].
Ku, WC ;
Chen, SM .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (01) :204-207
[9]   PASSWORD AUTHENTICATION WITH INSECURE COMMUNICATION [J].
LAMPORT, L .
COMMUNICATIONS OF THE ACM, 1981, 24 (11) :770-772
[10]   Fingerprint-based remote user authentication scheme using smart cards [J].
Lee, JK ;
Ryu, SR ;
Yoo, KY .
ELECTRONICS LETTERS, 2002, 38 (12) :554-555