Netinfo Security ›› 2021, Vol. 21 ›› Issue (4): 1-9.doi: 10.3969/j.issn.1671-1122.2021.04.001
ZHANG Yu, SUN Guangmin(), LI Yu
Received:
2020-12-10
Online:
2021-04-10
Published:
2021-05-14
Contact:
SUN Guangmin
E-mail:gmsun@bjut.edu.cn
CLC Number:
ZHANG Yu, SUN Guangmin, LI Yu. Research on Mobile Internet Authentication Scheme Based on SM9 Algorithm[J]. Netinfo Security, 2021, 21(4): 1-9.
符号 | 所代表的意义 |
---|---|
N | G1,G2,GT的阶,均为素数 |
P1 | G1的生成元 |
P2 | G2的生成元 |
KGC | 服务器的密钥生成中心 |
hid | KGC选择并公开用一个字节表示的私钥生成函数识别符 |
RC | 服务器的注册中心 |
IDS | 系统服务器的标识 |
Ppub | 系统服务器的主公钥 |
s | 系统服务器的主私钥 |
IDA | 终端用户A自主选定的自身标识 |
QA | 终端用户A的公钥 |
dA | 终端用户A的私钥(服务器密钥生成中心KGC生成) |
r | 用于加解密的随机数 |
pwA | 终端用户A的口令 |
RA1 | 终端用户A在首次注册时产生的随机数 |
RAi | 终端用户A在第i次注册(或认证)时产生的随机数 |
H⋅ | 单向哈希运算 |
tA1reg | 终端用户A首次注册的时间 |
tAireg | 终端用户A第i次注册(或认证)的时间 |
Δt | 有效时间间隔 |
DA(M) | 使用用户A的私钥对消息M执行数字签名算法 |
EA(M) | 使用用户A的公钥对消息M执行加密算法 |
运算 | 执行时间 | 运算 | 执行时间 |
---|---|---|---|
MD5哈希运算:TH | 0.97 | 从特征w′和P恢复出R:TRep | 180.97 |
DES对称加密:TE | 16 | IBC基于身份的签名:TIBS | 23.866 |
DES对称解密:TD | 16 | IBC基于身份的签名验证:TIBV | 5.872 |
切比雪夫映射:TC | 0.97 | SM9基于身份的签名:TSM9S | 704.4 |
RSA非对称 加密:TPE | 4 | SM9基于身份的验证:TSM9V | 593.29 |
RSA非对称 解密:TPD | 15.6 | SM9基于公钥的加密:TSM9PE | 938.96 |
原始生物特征w中获得s:TSS | 780 | SM9基于公钥的解密:TSM9PD | 938.96 |
从生物特征w′恢复特征w:TREC | 180 | 点乘运算:TM | 2.226 |
从特征w中获得P和R:TGEN | 780.97 | 双线性对:TP | 5.811 |
[1] | SHI Sha. Research on the Key Technologies of Secure Authentication and Applications in the Mobile Internet[D]. Beijing: Beijing University of Posts and Telecommunications, 2012. |
石莎. 移动互联网络安全认证及安全应用中若干关键技术研究[D]. 北京:北京邮电大学, 2012. | |
[2] |
LUO Junzhou, WU Wenjia, YANG Ming. Mobile Internet: Terminal Device, Networks and Service[J]. Chinese Journal of Computers, 2011,34(11):2029-2051.
doi: 10.3724/SP.J.1016.2011.02029 URL |
罗军舟, 吴文甲, 杨明. 移动互联网:终端、网络与服务[J]. 计算机学报, 2011,34(11):2029-2051. | |
[3] |
ZHAO Goufeng, SHAN Qing, XIAO Shasha, et al. Modeling Web Browsing on Mobile Internet[J]. Communications Letters IEEE, 2011,15(10):1081-1083.
doi: 10.1109/LCOMM.2011.082011.111368 URL |
[4] | LI Jun. Thoughts on Mobile Internet Security[J]. Network&Information, 2010,24(10):61. |
李钧. 移动互联网的安全之思[J]. 网络与信息, 2010,24(10):61. | |
[5] | LI Xiong. Research and Design on Identity Authentication Protocol for Multi-environments[D]. Beijing: Beijing University of Posts and Telecommunications, 2012. |
李雄. 多种环境下身份认证协议的研究与设计[D]. 北京:北京邮电大学, 2012. | |
[6] | LI Gang. Biometric Authentication: Sixth Token for Identity Authentication[J]. China Information Security, 2013,4(3):34-43. |
李刚. 生物识别: 身份认证的第六道“令牌”[J]. 中国信息安全, 2013,4(3):34-43. | |
[7] | YANG T C, LO N W, LIAW H T, et al. A Secure Smart Card Authentication and Authorization Framework Using in Multimedia Cloud[J]. Multimedia Tools and Applications, 2017,76(9):1715-1737. |
[8] | KARUPPIAH M, PRADHAN A, KUMARI S, et al. Security on "Secure Remote Login Scheme with Password and Smart Card Update Facilities"[C]// ICMC. Third International Conference on Mathematics and Computing, January 17-21, 2017, Haldia, India. Singapore: Springer, 2017: 26-33. |
[9] | SAE-BAE N, AHMED K, ISBISTER K, et al. Biometric-rich Gestures: A Novel Approach to Authentication on Multi-touch Devices[C]// SIGCHI. CHI '12: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, May 5-10, 2012, Austin, Texas, USA. New York: Association for Computing Machinery, 2012: 977-986. |
[10] | SEO H, KIM E, KIM H K. A Novel Biometric Identification Based on a User’s Input Pattern Analysis for Intelligent Mobile Devices[J]. International Journal of Advanced Robotic Systems, 2012,2012(9):1-10. |
[11] |
JANAKIRAMAN R, ZHANG Sheng, SIM T, et al. Continuous Verification Using Multimodal Biometrics[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2007,29(4):687-700.
doi: 10.1109/TPAMI.2007.1010 URL |
[12] |
LAMPORT L. Password Authentication with Insecure Communication[J]. Communications of the ACM, 1981,24(11):770-772.
doi: 10.1145/358790.358797 URL |
[13] |
HWANG M S, LI L H. A New Remote User Authentication Scheme Using Smart Cards[J]. IEEE Transactions on Consumer Electronics, 2000,46(1):28-30.
doi: 10.1109/30.826377 URL |
[14] |
CHIEN H Y, JAN J K, TSENG Y M. An Efficient and Practical Solution to Remote Authentication: Smart Card[J]. Computers & Security, 2002,21(4):372-375.
doi: 10.1016/S0167-4048(02)00415-7 URL |
[15] |
LI Xiong, NIU Jianwei, MA Jian, et al. Cryptanalysis and Improvement of a Biometrics-based Remote User Authentication Scheme Using Smart Cards[J]. Journal of Network and Computer Applications, 2011,34(1):73-79.
doi: 10.1016/j.jnca.2010.09.003 URL |
[16] |
HUANG X, XIANG Y, CHONKA A, et al. A Generic Framework for Three-factor Authentication: Preserving Security and Privacy in Distributed Systems[J]. Parallel and Distributed Systems, IEEE Transactions on, 2011,22(8):1390-1397.
doi: 10.1109/TPDS.2010.206 URL |
[17] |
HALEVI S, KRAWCZYK H. Public-key Cryptography and Password Protocols[J]. ACM Transactions on Information and System Security (TISSEC), 1999,2(3):230-268.
doi: 10.1145/322510.322514 URL |
[18] | YANG Piyi, CAO Zhenfu, DONG Xiaolei. Fuzzy Identity Based Signature with Applications to Biometric Authentication[J]. Computers & Electrical Engineering, 2011,37(4):532-540. |
[19] |
NEEDHAM R M, SCHROEDER M D. Using Encryption for Authentication in Large Networks of Computers[J]. Communications of the ACM, 1978,21(12):993-999.
doi: 10.1145/359657.359659 URL |
[20] |
FAN C I, LIN Yihui. Provably Secure Remote Truly Three Factor Authentication Scheme with Privacy Protection on Biometrics[J]. IEEE Transactions on Information Forensics and Security, 2009,4(4):933-945.
doi: 10.1109/TIFS.2009.2031942 URL |
[21] |
LI C T, HWANG M S. An Efficient Biometrics-based Remote User Authentication Scheme Using Smart Cards[J]. Journal of Network and Computer Applications, 2010,33(1):1-5.
doi: 10.1016/j.jnca.2009.08.001 URL |
[22] |
DAS A K. Analysis and Improvement on an Efficient Biometric-based Remote User Authentication Scheme Using Smart Cards[J]. IET Information Security, 2011,5(3):145-151.
doi: 10.1049/iet-ifs.2010.0125 URL |
[23] |
LEE C C, HSU C W. A Secure Biometric-based Remote User Authentication with Key Agreement Scheme Using Extended Chaotic Maps[J]. Nonlinear Dynamics, 2013,71(1-2):201-211.
doi: 10.1007/s11071-012-0652-3 URL |
[24] |
JIANG Qi, WEI Fushan, FU Shuai, et al. Robust Extended Chaotic Maps-based Three-factor Authentication Scheme Preserving Biometric Template Privacy[J]. Nonlinear Dynamics, 2016,83(4):2085-2101.
doi: 10.1007/s11071-015-2467-5 URL |
[25] | ALI R, PAL A K. A Secure and Robust Three-factor Based Authentication Scheme Using RSA Cryptosystem[J]. International Journal of Business Data Communications and Networking (IJBDCN), 2017,13(1):74-84. |
[26] |
ZHANG Min, ZHANG Jiashu, ZHANG Ying. Remote Three-factor Authentication Scheme Based on Fuzzy Extractors[J]. Security and Communication Networks, 2015,8(4):682-693.
doi: 10.1002/sec.1016 URL |
[27] |
ARMANDO A, CARBONE R, COMPAGNA L, et al. An Authentication Flaw in Browser-based Single Sign-on Protocols: Impact and Remediations[J]. Computers & Security, 2013,33(4):41-58.
doi: 10.1016/j.cose.2012.08.007 URL |
[28] | ZHANG Fuyou, WANG Qiongxiao, SONG Li. Research on Unified Identity Authentication System Based on Biometrics[J]. Netinfo Security, 2019,19(9):86-90. |
张富友, 王琼霄, 宋利. 基于生物特征识别的统一身份认证系统研究[J]. 信息网络安全, 2019,19(9):86-90. | |
[29] | ZHANG Xiao, LIU Jiqiang. Multi-factor Authentication Protocol Based on Hardware Fingerprint and Biometrics[J]. Netinfo Security, 2020,20(8):9-15. |
张骁, 刘吉强. 基于硬件指纹和生物特征的多因素身份认证协议[J]. 信息网络安全, 2020,20(8):9-15. | |
[30] | CHANG H, CHOI E. User Authentication in Cloud Computing[C]// UCMA. Second International Conference on Ubiquitous Computing and Multimedia Applications, April 13-15, 2011, Daejeon, Korea. Heidelberg: Springer-Verlag, 2011: 338-342. |
[31] |
LEE CC. A Simple Key Agreement Scheme Based on Chaotic Maps for VSAT Satellite Communications[J]. International Journal of Satellite Communications and Networking, 2013,31(4):77-186.
doi: 10.1002/sat.v31.2 URL |
[1] | WANG Jian, ZHAO Manli, CHEN Zhihao, SHI Bo. An Authentication Scheme for Conditional Privacy Preserving Based on Pseudonym in Intelligent Transportation [J]. Netinfo Security, 2021, 21(4): 49-61. |
[2] | LIU Yanhua, LIU Zhihuang. An Anonymous Data Authentication Method Based on User Behavior Pattern [J]. Netinfo Security, 2021, 21(3): 44-52. |
[3] | DONG Qiang, LUO Guoming, SHI Hongkui, ZHANG Yongyue. Research on Authentication and Key Agreement Method of IMS-based Mobile Communication Private Network [J]. Netinfo Security, 2021, 21(1): 88-96. |
[4] | YU Guo, WANG Chonghua, CHEN Xuehong, LI Jun. Industrial Internet Identifier Resolution Security from the Perspective of Authentication [J]. Netinfo Security, 2020, 20(9): 77-81. |
[5] | WANG Li, LI Erxia, JI Yuchen, LI Xiaoyong. PUF-based Anti-physical Cloning RFID Security Authentication Protocol [J]. Netinfo Security, 2020, 20(8): 89-97. |
[6] | ZHANG Xiao, LIU Jiqiang. Multi-factor Authentication Protocol Based on Hardware Fingerprint and Biometrics [J]. Netinfo Security, 2020, 20(8): 9-15. |
[7] | SUN Ziwen, ZHANG Xiangyang. Large-scale Mobile RFID System Shamir’s Key Sharing PUF Security Authentication Protocol [J]. Netinfo Security, 2020, 20(6): 26-35. |
[8] | LI Ning, LI Bochao. Token-based UTM Architecture for Mobile Internet [J]. Netinfo Security, 2020, 20(3): 18-28. |
[9] | LIU Xiaofen, CHEN Xiaofeng, LIAN Guiren, LIN Song. Authenticated Multiparty Quantum Secret Sharing Protocol with d-level Single Particle [J]. Netinfo Security, 2020, 20(3): 51-55. |
[10] | HOU Lin, FENG Da, XUAN Pengkai, ZHOU Fucai. Outsourcing Database Join Query Verification Scheme Based on Authentication Tree [J]. Netinfo Security, 2020, 20(2): 91-97. |
[11] | ZHAO Guofeng, ZHOU Wentao, XU Chuan, XU Lei. A Secure Identity Authentication Scheme for Space-ground Integrated Network Based on Bilinear Pairing [J]. Netinfo Security, 2020, 20(12): 33-39. |
[12] | YU Beiyuan, LIU Jianwei, ZHOU Ziyu. Research on Node Authentication Mechanism in Self-organizing Network Environment [J]. Netinfo Security, 2020, 20(12): 9-18. |
[13] | ZHANG Zheng, ZHA Daren, LIU Yanan, FANG Xuming. PUF-based Kerberos Extension Protocol with Formal Analysis [J]. Netinfo Security, 2020, 20(12): 91-97. |
[14] | LIU Lijuan, LI Zhihui, ZHI Danli. A Multi-party Quantum Key Distribution Protocol with Quantum Identity Authentication [J]. Netinfo Security, 2020, 20(11): 59-66. |
[15] | CHENG Yang, LEI Min, LUO Qun. Access Authentication Method for IoT Terminal Devices Based on Deep Learning [J]. Netinfo Security, 2020, 20(11): 67-74. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||