透過您的圖書館登入
IP:18.188.40.207
  • 學位論文

基於身份認證的三方密鑰協定

The password authentication for the three-party key agreement protocol

指導教授 : 黃慧鳳

摘要


隨著無線通訊網路技術蓬勃發展,人們使用行動設備(mobile device)以及其電子商務之各類加值應用已非常普及。消費者以手機作為第三方支付的工具,而其中的消費者、商店、和銀行業者(或信賴中心)之三方,要如何提供安全且有效率之身份驗證,已成為重要之議題。 先前已有許多學者提出三方驗證協定機制的方法,大都須要建立在公開金鑰系統的運算,但行動裝置之記憶體以及運算能力均較受到限制,高次的指數運算密碼系統,並不適合於行動設備之環境。 2014年,Lai等人提出三方驗證協定機制(3PKAE),其宣稱無須建立公開金鑰系統的運算及高次之模指數運算,可增加系統實作與行動裝置實際應用的便利性。在Lai等人方法中[15],我們將指出其方法仍需高次之指數運算才能符合資訊安全之需求外,Lai等人之三方驗證協定之效率較差,且有偽冒、離線(off-line)窮舉攻擊等風險,所以Lai等人者所提出之方法不具效率且較不安全,並不適用於行動裝置之設備。 本研究基於Chebyshev 混沌多項式,提出一個低傳輸量且低運算量的三方驗證協定技術,其無須建立公開金鑰密碼系統,且系統端只需一次的傳送與接收(two rounds),能有效地提高使用者端與系統端之運算與傳送速度,可提高實際的應用價值且適用於行動裝置。

並列摘要


As wireless communication network technology to flourish, people use mobile devices and a variety of value-added application of its e-commerce has been very popular. Consumer mobile phone as a tool for third-party payment, of which consumers, shops, banks and (or a trusted server) of the tripartite, how to provide security and identity verification efficiency, it has become an important issue. Many scholars have previously been proposed tripartite agreement verification mechanism approach, most of the operational need to establish a public key system, but the memory and computing capacity of mobile devices compared with limited high-order index computing system password, is not suitable for action environmental equipment. 2014, Lai et al proposed three-party key authentication agreement protocol (3PKAE), which claimed that without the establishment and operation of high modular exponentiation followed by public key system, increase the system implementation and practical application of mobile convenience. This study was based on Chebyshev polynomial chaos, made a low transmission capacity and low computational verification of tripartite technical agreement, which was used without creating a public key cryptography system, and the system is just one side of the transmission and receipt (two rounds), can effectively improve end user computing and transmission speed and the system side can improve the practical value and is suitable for mobile devices.

參考文獻


[26] Guo, C., Chang, C. C., Sun, C. Y., “Chaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications”, Information Hiding and Multimedia Signal Processing, 4(2), pp.99-109, 2013.
[1] Xiang, T., Wong, K., Liao, X., “On the securit of a novel key agreement protocol based on chaotic maps”, Chaos Solitons Fractals, 40(2), pp.672-675, 2009.
[2] Tseng, H., Jan, R., Yang, W., “A chaotic maps-based key agreement protocol that preserves user anonymity”, IEEE International Conference on Communications, ICC’09, Dresden, Germany, pp. 1-6, 2009.
[3] Lee, C.C., Chen, C.L., Wu, C.Y., Huang, S.Y., “An extended chaotic maps-based key agree¬ment protocol ith user anonymity’, Nonlinear Dyn, 69, pp.79-87, 2012.
[4] He, D., Chen, Y., Chen, J., “Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol”, Nonlinear Dyn, 69, pp.1149-1157, 2012.

延伸閱讀