Authentication and Delegation with Smart-cards
نویسندگان
چکیده
The authentication of users in distributed systems poses special problems because users lack the ability to encrypt and decrypt. The same problems arise when users wish to delegate some of their authority to nodes, after mutual authentication. In most systems today, the user is forced to trust the node he wants to use. In a more satisfactory design, the user carries a smart-card with suucient computing power to assist him; the card provides encryption and decryption capabilities for authentication and delegation. Authentication is relatively straightforward with a powerful enough smart-card. However, for practical reasons, protocols that place few demands on smart-cards should be considered. These protocols are subtle, as they rely on fairly complex trust relations between the principals in the system (users, hosts, services). In this paper, we discuss a range of public-key smart-card protocols, and analyze their assumptions and the guarantees they ooer.
منابع مشابه
An Implementable Scheme for Secure
The need for delegating information arises when the data owner wants to have her data handled by an external party. If the external party is untrusted and data are conndential, delegation should be performed in a way that preserves security. Uses of delegation range from public administration to smart cards. In this paper, correctness and security requirements as well as protocols are speciied ...
متن کاملBiometric User Authentication on Smart Cards by Means of Handwritten Signatures
This paper describes a biometric method for user authentication on smart cards. Smart cards are chip cards with the ability for data processing directly on the card. They are not only usable for storing biometric reference data, but biometric user authentication methods can also be performed on card in order to protect security-relevant functions or data on the cards. The biometric data under c...
متن کاملOn the Remote Authentication with Self - Protected Smart Cards 植基於具自保功能智慧卡之遠端認證機制
Smart card is a secure device for remote authentication. However, if cardholders lost their card, attackers always can successfully guess passwords and impersonate legal users to login. In 2004, Lee et al. proposed a remote authentication scheme with smart cards. In this paper, we first show that their scheme cannot withstand the guessing attack. If attackers obtain the card, they can successfu...
متن کاملImproving the Password-Based Authentication against Smart Card Security Breach
Password-based authentications using smart cards are very necessary between login users and a remote server. Smart card security breach threatens the security of password-based authentication schemes with smart cards. A password-based authentication scheme with smart cards against smart card security breach was proposed by C.T. Li et al. recently. However, it is noted that Li et al.'s scheme ne...
متن کاملFully Verifiable Secure Delegation of Pairing Computation: Cryptanalysis and An Efficient Construction
We address the problem of secure and verifiable delegation of general pairing computation. We first analyze some recently proposed pairing delegation schemes and present several attacks on their security and/or verifiability properties. In particular, we show that none of these achieve the claimed security and verifiability properties simultaneously. We then provide a fully verifiable secure de...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Sci. Comput. Program.
دوره 21 شماره
صفحات -
تاریخ انتشار 1991