Journal of South China University of Technology (Natural Science Edition) ›› 2009, Vol. 37 ›› Issue (5): 111-117.

• Computer Science & Technology • Previous Articles     Next Articles

Identity Authentication and Key Agreement Based on Circle Properties

Ge Li-na  Tang Shao-hua   

  1. School of Computer Science and Engineering, South China University of Technology, Guangzhou 510006, Guangdong, China
  • Received:2008-06-04 Revised:2008-09-01 Online:2009-05-25 Published:2009-05-25
  • Contact: 葛丽娜(1969-),女,博士生,主要从事信息安全研究. E-mail:gelina100@gmail.com
  • About author:葛丽娜(1969-),女,博士生,主要从事信息安全研究.
  • Supported by:

    国家“863”计划项目(2007AA01ZA24);国家自然科学基金资助项目(60572139);国家科技支撑计划项目(2007BAH13803);教育部新世纪优秀人才支持计划项目(NCET-06-0744);霍英东教育基金资助项目(101069)

Abstract:

In order to improve the security of the authentication scheme based on geometric properties, an identity authentication and key agreement scheme based on circle properties is proposed, the basic principle of which is that an n-dimension circle can be reconstructed by any n + 1 n-dimension points on it, and a multi-variable one-way hash function is used to calculate the login message and to improve the robustness of the login message for security. Thus, the scheme ean withstand the attacks, such as the password guess, replay, eavesdropping and off-line mes- sage analysis. The proposed scheme is proved secure by a formal approach at last.

Key words: identity authentication, key agreement, security, circle property, formal approach