期刊文献+

一种Canetti-Krawczyk模型下的快速认证协议 被引量:2

Fast authentication protocol based on the Canetti-Krawczyk model
下载PDF
导出
摘要 基于Canetti-Krawczy模型的安全性定义与模块化特性,利用公钥加密和消息认证码技术,构造了一个快速认证协议,并对该协议的安全性进行了详细的分析.分析表明,该协议实现了Canetti-Krawczy模型下可证明安全的快速身份认证、密钥协商和密钥更新,且具有双向实体认证、完美的向前保密性等安全属性,满足了认证的安全需求.该认证协议仅需进行2轮交互即可完成,与现有同类协议相比,通信开销小,计算量较低,为用户间的相互认证提供了一种高效的解决方案. Based on the Canetti-Krawczyk(CK) model, a fast authentication protocol which makes use of the public key cryptography and the Message Authentication Code is proposed. The security analysis of the proposed protocol in the implementation plan with the CK model is presented. The results show that the proposed protocol is session-key secure with Perfect Forward Secrecy, Known Key Security and No Key Compromise Impersonation. Moreover, the implementation of the protocol requires just two rounds of communications and a little computation, and it could be an efficient authentication method between users in a network.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2009年第1期156-161,共6页 Journal of Xidian University
基金 国家自然科学基金资助(60803151 60772136) 高等学校学科创新引智计划资助(B08038)
关键词 认证协议 Canetti—Krawczyk模型 可证明安全 安全分析 公钥密码 authentication protocol Canetti-Krawczyk model provably security security analysis public key cryptography
  • 相关文献

参考文献11

  • 1Yang F Y, Jan J K. An Enhanced and Secure Protocol for Authenticated Key Exchange [DB/OL]. [2004-10-21]. http://eprint. iacr. org/2004/270.
  • 2Tin Y S T, Boyd C. Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach [C]//ACISP 2003. Berlin: Springer-Verlag, 2003: 166-179.
  • 3冯登国,陈伟东.基于口令的安全协议的模块化设计与分析[J].中国科学(E辑),2007,37(2):223-237. 被引量:14
  • 4杨超,曹春杰,马建峰.通用可组合安全的Mesh网络认证协议[J].西安电子科技大学学报,2007,34(5):814-817. 被引量:10
  • 5Raimondo M D, Gennaro R. Provably Secure Threshold Password-authenticated Key Exchange: LNCS 2656 [C]// Proceedings of the Advances in Cryptology-EUROCRYPT 2003. Berlin: Springer-Verlag, 2003:507-523
  • 6Canetti R, Krawczyk H. Analysis of Key-exchange Protocol and Their Use for Building Secure Channel[C]//Proceedings of the Euro-crypt 01. Berlin: Springer-Verlag, 2001: 453-474.
  • 7IEEE P802. 11i/D3.0. Specification for Enhanced Security [DB/OL]. [2002-11-12]. http://standards.ieee. org/ reading/ieee/std/lanman/drafts/P802.11i. pdf.
  • 8中华人民共和国国家标准.国标GB15629.11-2003信息远程通信和信息交换局域网和城域网特定要求第11部分:无线局域网媒体访问控制和物理层规范[S].北京:中国标准出版社,2003.
  • 9Bellare M, Canetti R, Krawczyk H. A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols[C]//Proceeding of the 30th Annual Symposium on the Theory of Computing. New York: ACM Press, 1998: 419-428.
  • 10Canetti R, Goldreich O, Halevi S. The Random Oracle Methodology Revisited [J]. Journal of the ACM, 2004, 51(4) : 557-594.

二级参考文献7

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 2段宁,马建峰.基于IEEE802.11b网卡的WPA与WAPI集成接入方法[J].西安电子科技大学学报,2006,33(5):804-808. 被引量:3
  • 3Aboba B, Simon D. On the Security of Public Key Protocols[J]. IEEE Trans on Information Theory, 1983, 29(2): 198-208.
  • 4Canetti R. Universally Composable Security: a New Paradigm for Cryptographic Protocols[C]//Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science (FOCS). New York: IEEE Press, 2001: 136-145.
  • 5Bellare M, Canetti R, Krawczyk H. A Modular Approach to the Design and Analysis of Authentication and Key-exchange Protocols[C]//Proc of the 30th Annual Symp. on the Theory of Computing. New York: ACM Press, 1998: 419-428.
  • 6Canetti R, Krawczyk H. Security Analysis of IKE's Signature-based Key-exchange Protocol[C]//LNCS2442. Berlin: Springer-Verlag, 2002: 143-161.
  • 7Goldwasser S, Micali S, Rivest R. A Digital Signature Scheme Secure Against Adaptive Chosen-message Attacks[J]. SIAM Journal on Computing, 1998, 17(2): 281-308.

共引文献22

同被引文献12

  • 1WANG Shengbao,CAO Zhenfu,WANG Licheng.Efficient Certificateless Authenticated Key Agreement Protocol from Pairings[J].Wuhan University Journal of Natural Sciences,2006,11(5):1278-1282. 被引量:24
  • 2SHI Yijuan LI Jianhua.Two-Party Authenticated Key Agreement in Certificateless Public Key Cryptography[J].Wuhan University Journal of Natural Sciences,2007,12(1):71-74. 被引量:23
  • 3Lee Y S, Kim E, Seok SJ, et al. A Smartcard-Based User Authentication Scheme to Ensure the PFS in Multi-Server Environments[J]. IEICE Transactions on Communications, 2012, E95-B(2): 619-622.
  • 4Juang W S. Efficient Multi-server Password Authenticated Key Agreement Using Smart Cards[J]. IEEE Transactions on Consumer Electronics, 2004, 50(1): 251-255. ?.
  • 5Liao Y P, Hsiao C M. A Novel Multi-server Remote User Authentication Scheme Using Self-certified Public Keys for Mobile Clients[J]. Future Generation Computer Systems, 2013, 29(3): 886-900.
  • 6TsaiJ L. Efficient Multi-server Authentication Scheme Based on One-way Hash Function without Verification Table[J]. Computers & Security, 2008, 27(3-4): 115-12l.
  • 7Lee C C, Lin T H, Chang R X. A Secure Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment Using Smart CardsjI}. Expert Systems with Applications, 2011, 38(11): 13863-13870.
  • 8Liao Y P, Wang S S. A Secure Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment[J]. Computer Standards & Interfaces, 2009, 31(1): 24-29.
  • 9Hsiang H C, Shih W K. Improvement of the Secure Dynamic ID Based Remote User Authentication Scheme for Multi?server EnvironmentJ J}. Computer Standards & Interfaces, 2009, 31(6): 1118-1123.
  • 10Sood S K, Sarje A K, Singh K. A Secure Dynamic Identity Based Authentication Protocol for Multi-server Architecture[J].Journal of Network and Computer Applications, 2011, 34(2): 609-618.

引证文献2

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部