期刊文献+

一种有密钥确认的安全认证密钥协商协议 被引量:2

Secure Authenticated Key Agreement with Key Confirmation Protocol
原文传递
导出
摘要 UAP协议不具有前向保密性和密钥泄露的安全性。论文提出了一种安全的AKC协议,简称SAKC协议,它不仅具有前向保密性和密钥泄露的安全性,还有较好的执行效率。 UAP protocol does not achieve forward secrecy and key-compromise impersonation. An Elliptic Curve Cryptography based Secure AKC Protocol-SAKC protocol was proposed, not only it achieves forward secrecy and key-compromise impersonation, but holds good efficiency of the performance.
出处 《信息安全与通信保密》 2006年第10期128-129,132,共3页 Information Security and Communications Privacy
基金 国家自然科学基金资助项目(№60373085)
关键词 认证密钥协商协议 密钥泄露的安全性 密钥确认 authenticated key agreement key-compromise impersonation key confirmation
  • 相关文献

参考文献4

  • 1[1]Menezes A,Van O P,Vanstone S.Handbook of Applied Cryptography.New York:CRC Press,1997:489-494.
  • 2[2]Aydos M,Sunar B,Koc C K.An elliptic curve cryptography based authentication and key agreement protocol for wireless communication.The second International Workshop on Discrete Algorithms and MethodS for Mobile Computing and Communications,Dallas,Texas,1998-10-30.
  • 3[3]Lam L,Menezes A,Qu M,et al.An efficient Protocol for Authenticated Key Agreement.Designs,Codes and Cryptography,2003,28:119-134.
  • 4[4]Mangipudi K,Malneedi N,Katti R,et al.Attacks and solutions on Aydos-Savas-Koc's wireless authentication protocol.IEEE Global Telecommunications Conference,Dallas,Texas,2004,4:2229-2234.

同被引文献16

  • 1李波,杨茂云,何大可.一种智能卡口令认证方案的分析与改进[J].通信技术,2003,36(8):104-105. 被引量:3
  • 2王元珍,冯超.数据库加密系统的研究与实现[J].计算机工程与应用,2005,41(8):170-172. 被引量:44
  • 3赖欣,阮志刚,彭代渊.基于公钥密码体制的3G认证协议改进[J].信息安全与通信保密,2006,28(5):104-105. 被引量:4
  • 4金立杰,许春香.基于身份的认证密钥协商协议[J].信息安全与通信保密,2007,29(8):20-22. 被引量:5
  • 5Abadim M, Needham R M. Prudent Engineering Practice for Cryptographic Protocols[J]. IEEE Transactions on Software Engineering, 1996, 22(01):6-15.
  • 6Bellare M, Canetti R, Krawczyk H. A modular approach to the design and analysis of authentication and key exchange protocols [C]//Proceedings of the 30th Annual Symposium on the Theory of Computing. New York: ACM Press, 1998:419-428.
  • 7DattaA, Derek A, Mitchel J C, et al. A derivation system and compositional logic for security protocols[J].Journal of Computer Security, 2005,13(03):423-482.
  • 8腾讯网.CSDN详解600万用户密码泄露始末[EB/OL].(2011-12-21)[2013-05-10].http://tech.qq.com/a/2011122I/000485.htm.
  • 9腾讯网.天涯4000万用户密码遭泄露[EB/OL].(2011-12-25)[2013一05-10].http://tech.qq.com/a/20111225/000079.htm.
  • 10GILMORE W J. Beginning PHP and MySQL 5: From Novice to Professional[M].Germany: Springer, 2006: 70-85.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部