首页> 外文会议>IT convergence and services >Weakness in a User Identification Scheme with Key Distribution Preserving User Anonymity
【24h】

Weakness in a User Identification Scheme with Key Distribution Preserving User Anonymity

机译:密钥分配保持用户匿名的用户标识方案中的弱点

获取原文
获取原文并翻译 | 示例

摘要

Recently, Hsu and Chuang proposed a novel user identification scheme with key distribution for distributed computer networks. The Hsu-Chuang scheme permits a user to anonymously log into a system and establish a secret key shared with the system. In this paper, we show that the Hsu-Chuang scheme is not secure against known session key attacks. To show the insecurity, we describe an adversary who can recover the private key of a user by performing know session key attacks. We also provide a countermeasure which can be used for enhancing the security the Hsu-Chuang scheme.
机译:最近,Hsu和Chuang提出了一种新的带有密钥分布的用户识别方案,用于分布式计算机网络。 Hsu-Chuang方案允许用户匿名登录系统并建立与系统共享的密钥。在本文中,我们证明了Hsu-Chuang方案对已知的会话密钥攻击并不安全。为了显示这种不安全感,我们描述了一个可以通过执行已知会话密钥攻击来恢复用户私钥的对手。我们还提供了可用于增强Hsu-Chuang方案安全性的对策。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号