{"title":"点对点系统中一种高效的用户对用户认证方案","authors":"Ziming Zhao, Yanfei Liu, Hui Li, Yixian Yang","doi":"10.1109/ICINIS.2008.142","DOIUrl":null,"url":null,"abstract":"In peer-to-peer environment, information is directly exchanged between nodes instead of forwarding by a central server, hence user-to-user authentication becomes a critical security issue in such environment. Existing solutions are based on public-key cryptosystem. The main concerns in a public-key cryptosystem include authenticity of the public key and lack of efficiency. A trusted third party is also involved in a public-key environment. This paper proposed an efficient one-way hash function based user-to-user authentication scheme with smart card in peer-to-peer system. In the proposed scheme, the system and peers do not have to maintain verification tables, and a trusted third party is not needed in the run time. The proposed scheme achieves mutual authentication at very low computational cost, but also provides good security strength.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"An Efficient User-to-User Authentication Scheme in Peer-to-Peer System\",\"authors\":\"Ziming Zhao, Yanfei Liu, Hui Li, Yixian Yang\",\"doi\":\"10.1109/ICINIS.2008.142\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In peer-to-peer environment, information is directly exchanged between nodes instead of forwarding by a central server, hence user-to-user authentication becomes a critical security issue in such environment. Existing solutions are based on public-key cryptosystem. The main concerns in a public-key cryptosystem include authenticity of the public key and lack of efficiency. A trusted third party is also involved in a public-key environment. This paper proposed an efficient one-way hash function based user-to-user authentication scheme with smart card in peer-to-peer system. In the proposed scheme, the system and peers do not have to maintain verification tables, and a trusted third party is not needed in the run time. The proposed scheme achieves mutual authentication at very low computational cost, but also provides good security strength.\",\"PeriodicalId\":185739,\"journal\":{\"name\":\"2008 First International Conference on Intelligent Networks and Intelligent Systems\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 First International Conference on Intelligent Networks and Intelligent Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICINIS.2008.142\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 First International Conference on Intelligent Networks and Intelligent Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICINIS.2008.142","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Efficient User-to-User Authentication Scheme in Peer-to-Peer System
In peer-to-peer environment, information is directly exchanged between nodes instead of forwarding by a central server, hence user-to-user authentication becomes a critical security issue in such environment. Existing solutions are based on public-key cryptosystem. The main concerns in a public-key cryptosystem include authenticity of the public key and lack of efficiency. A trusted third party is also involved in a public-key environment. This paper proposed an efficient one-way hash function based user-to-user authentication scheme with smart card in peer-to-peer system. In the proposed scheme, the system and peers do not have to maintain verification tables, and a trusted third party is not needed in the run time. The proposed scheme achieves mutual authentication at very low computational cost, but also provides good security strength.