透過您的圖書館登入
IP:3.22.248.208
  • 期刊

Two Lightweight Authenticated Key Agreement Protocols Using Physically Unclonable Function with Privacy Protection

摘要


With the continuous development of the information age, people's demand for information security also increases. In recent years, some people combine passwords with input Physically unclonable function (PUF) to authenticate unsafe communication more effectively. The PUF described in this authentication method has a hardware-based embedding function and has significant physical inconsistency. In this paper, we will continue to propose more effective authentication protocols based on the PUF algorithm. In published articles, authentication involves only one user and one server. Today, we discuss a text authentication protocol involving three parties: a three-party key agreement protocol based on the PUF algorithm. This key agreement protocol has more practical functions. The two users in the protocol and the server have different public keys and their private keys. After a series of calculations and the server's message transmission, the information in the two users' hands has matched again. Based on continuous experiments, we find that this key agreement protocol is effective.

延伸閱讀