Font Size: a A A

Research On Remote Identity Authentication And Key Consensus Scheme

Posted on:2018-06-06Degree:MasterType:Thesis
Country:ChinaCandidate:M WangFull Text:PDF
GTID:2358330515499245Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In the field of information security,on the one hand we should ensure information confidentiality to prevent confidential information communication from stealing and deciphering.On the other hand we should ensure the information integrity,validity,and make clear whether the identity of the one we communication with is true to confirm the information in the transmission process has been not tampered with,faked and denied.Identity authentication technology is one of the most important applications of the current network information system.In today's network application environment,the security of network resources usually uses the resource access control policy based on user identity.The role of identity authentication is to identify the user's identity.It is one of the important foundation of network security management.As an important method in network information security,identity authentication technology can protect the data and service in network information system from being accessed by unauthorized users.Firstly,this paper introduces the background and significance of identity authentication;secondly,this paper introduces mathematics knowledge on identity authentication;thirdly,this paper analyses the papers of Sheetal Kalra and Li et al.respectively,and points out the emerging potential risk of their scheme,and then improved their scheme and gives security analysis for the improved scheme.
Keywords/Search Tags:cryptography, identity authentication, key agreement, security
PDF Full Text Request
Related items