• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Tian Junfeng, Jiao Hongqiang, Li Ning, and Liu Tao. Double Secret Keys and Double Random Numbers Authentication Scheme[J]. Journal of Computer Research and Development, 2008, 45(5): 779-785.
Citation: Tian Junfeng, Jiao Hongqiang, Li Ning, and Liu Tao. Double Secret Keys and Double Random Numbers Authentication Scheme[J]. Journal of Computer Research and Development, 2008, 45(5): 779-785.

Double Secret Keys and Double Random Numbers Authentication Scheme

More Information
  • Published Date: May 14, 2008
  • The computer network is an open system, and it leads to considerable security vulnerabilities and security threats in computer network. The network resources can easily be visited and illegally copied. So the identity authentication of the Web source visitor has become very important. In 1981, Lamport proposed an authentication scheme based on keywords table. This scheme can resist the replay attack, but will be not in security when the password stored in the host is attacked. Smart card can be more available to identity authentication. Many authentication schemes based on smart card are proposed for improving authentication efficiency and security. Firstly, Manik Lal Das’s authentication scheme is analyzed detailedly in this paper. It has time synchronization problem and vulnerable forgery attack. So, mutual authentication scheme based on bilinear pairings which is using smart card is proposed. A novel technique of using double secret keys and double random numbers for preventing forgery attack in authentication process is proposed. It enhances the security of the authentication system and accomplishes mutual authentication safely between the user and the remote system. Finally, the scheme finishes the correctness attestation, and security and computation complexity analysis.
  • Related Articles

    [1]Fu Tao, Chen Zhaojiong, Ye Dongyi. GAN-Based Bidirectional Decoding Feature Fusion Extrapolation Algorithm of Chinese Landscape Painting[J]. Journal of Computer Research and Development, 2022, 59(12): 2816-2830. DOI: 10.7544/issn1000-1239.20210830
    [2]Guo Sixu, He Shen, Su Li, Zhang Xing, Zhou Fucai, Zhang Xinyue. Top-k Boolean Searchable Encryption Scheme Based on Multiple Keywords[J]. Journal of Computer Research and Development, 2022, 59(8): 1841-1852. DOI: 10.7544/issn1000-1239.20200605
    [3]Jiang Bin, Liu Hongyu, Yang Chao, Tu Wenxuan, Zhao Zilong. A Face Inpainting Algorithm with Local Attribute Generative Adversarial Networks[J]. Journal of Computer Research and Development, 2019, 56(11): 2485-2493. DOI: 10.7544/issn1000-1239.2019.20180656
    [4]Guo Yingjie, Liu Xiaoyan, Wu Chenxi, Guo Maozu, Li Ao. U-Statistics and Ensemble Learning Based Method for Gene-Gene Interaction Detection[J]. Journal of Computer Research and Development, 2018, 55(8): 1683-1693. DOI: 10.7544/issn1000-1239.2018.20180365
    [5]Zhang Peng, Duan Lei, Qin Pan, Zuo Jie, Tang Changjie, Yuan Chang’an, Peng Jian. Mining Top-k Distinguishing Sequential Patterns Using Spark[J]. Journal of Computer Research and Development, 2017, 54(7): 1452-1464. DOI: 10.7544/issn1000-1239.2017.20160553
    [6]Li Bohan, Zhang Chao, Li Dongjing, Xu Jianqiu, Xia Bin, Qin Xiaolin. A DSP-Topk Query Optimization Algorithm Supporting Indoor Obstacle Space[J]. Journal of Computer Research and Development, 2017, 54(3): 557-569. DOI: 10.7544/issn1000-1239.2017.20150895
    [7]Zhang Jianfeng, Han Weihong, Fan Hua, Zou Peng, Jia Yan. An Algorithm for Top-k Query Refinement Based on User’s Feedback[J]. Journal of Computer Research and Development, 2014, 51(10): 2206-2215. DOI: 10.7544/issn1000-1239.2014.20130827
    [8]Jiang Tao, Zhang Bin, Gao Yunjun, Yue Guangxue. Efficient Top-k Query Processing on Mutual Skyline[J]. Journal of Computer Research and Development, 2013, 50(5): 986-997.
    [9]Wang Shuang, Wang Guoren. Sliding Window Top-K Frequent Item Query on Uncertain Stream[J]. Journal of Computer Research and Development, 2012, 49(10): 2189-2197.
    [10]Xiong Gangqiang, Yu Jiande, Xiong Changzhen, Qi Dongxu. Reversible Factorization of U Orthogonal Transform and Image Lossless Coding[J]. Journal of Computer Research and Development, 2012, 49(4): 856-863.

Catalog

    Article views (947) PDF downloads (676) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return