北京航空航天大学学报 ›› 2019, Vol. 45 ›› Issue (5): 1052-1058.doi: 10.13700/j.bh.1001-5965.2018.0512

• 论文 • 上一篇    

基于切比雪夫混沌映射和生物识别的身份认证方案

董晓露1,2, 黎妹红1,2, 杜晔1,2, 吴倩倩1,2   

  1. 1. 北京交通大学 智能交通数据安全与隐私保护技术北京市重点实验室, 北京 100044;
    2. 北京交通大学 计算机与信息技术学院, 北京 100044
  • 收稿日期:2018-08-31 出版日期:2019-05-20 发布日期:2019-05-21
  • 通讯作者: 黎妹红.E-mail:mhli1@bjtu.edu.cn E-mail:mhli1@bjtu.edu.cn
  • 作者简介:董晓露 女,硕士研究生。主要研究方向:身份认证;黎妹红 男,博士,讲师。主要研究方向:身份认证、保密技术。

A biometric verification based authentication scheme using Chebyshev chaotic mapping

DONG Xiaolu1,2, LI Meihong1,2, DU Ye1,2, WU Qianqian1,2   

  1. 1. Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing 100044, China;
    2. School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China
  • Received:2018-08-31 Online:2019-05-20 Published:2019-05-21

摘要: 云计算中访问控制和安全性是两大问题,且与传统的身份认证存在一定区别。利用切比雪夫多项式的半群特性、混沌特性,提出了一种基于切比雪夫混沌映射和生物识别的口令认证密钥协商方案。用户和服务器首先在云服务提供商(CSP)处进行注册,随后无需CSP的参与即可完成认证,建立会话密钥。安全性分析和性能比较表明,方案满足许多安全因素,如双向认证、用户隐私保护、多因素安全、前向安全性,即使CSP的主密钥被泄露,前向安全性也能确保用户会话密钥的机密性;此外,方案还能抵抗中间人攻击、离线口令猜测攻击和仿冒攻击等,并且支持多服务器环境中用户口令和生物特征的高效变更。

关键词: 切比雪夫混沌映射, 身份认证, 密钥协商, 云计算, 生物识别

Abstract: In cloud computing, access control and security are two major problems, and there are some differences from traditional identity authentication. Inspired by the semi-group and chaotic properties of Chebyshev polynomials, a scheme of password-authenticated key agreement using Chebyshev chaotic mapping and biometrics has been presented. In the proposed model, the users and the servers need to register at the cloud service provider (CSP) in the beginning. Then they can complete authentication and establish session key without the participation of CSP. Moreover, security analysis and performance comparison show that the proposed scheme satisfies many security factors, such as mutual authentication, user privacy protection, multi-factor security and forward security. Forward security assures the confidentiality of the user's session key, even if the private key of the CSP is compromised. The proposed scheme is also robust to resist man-in-the-middle attacks, off-line password guessing and impersonation attacks, etc. In addition, it supports efficient changes to user passwords and biometric characteristics in a multi-server environment.

Key words: Chebyshev chaotic mapping, authentication, key agreement, cloud computing, biometric verification

中图分类号: 


版权所有 © 《北京航空航天大学学报》编辑部
通讯地址:北京市海淀区学院路37号 北京航空航天大学学报编辑部 邮编:100191 E-mail:jbuaa@buaa.edu.cn
本系统由北京玛格泰克科技发展有限公司设计开发