期刊文献+

基于不同口令认证的跨域组密钥协议 被引量:1

Cross-realm Group PAKE Protocol Using Different Passwords
下载PDF
导出
摘要 近年来关于基于口令认证的密钥交换协议(PAKE)进行了广泛的研究,基于口令认证的组密钥交换协议已成为安全协议研究的焦点问题。Byun等人也先后提出了基于不同口令认证的跨域环境下端到端的两个客户之间的PAKE(C2C-PAKE)密钥交换协议。然而在实际应用中,往往还需要在多个客户或客户组之间建立安全的通信信道。因此,提出了基于不同口令认证的跨域组间密钥交换协议,该协议将ZhiguoWan等人所提出的nPAKE+协议扩展到了两个域,实现了两个域中的客户组在域服务器的协助下,建立域间共享的组会话密钥的过程,并给出了安全分析和执行效率的代价分析。 Recently, several group password-authenticated key exchange (PANE) protocols have been proposed. Byun and Zhigou Wan et al. also proposed different passwords group PAKE protocols successively, and the clients in their protocols were all in the same realm. However, in practice we also need to establish a secure communication channel between groups who are in different realms. So, we proposed a cross-realm group PAKE protocol using different pass- words. The proposed protocol extends Zhigou Wan et al. 's nPAKE+ protocol from single realm to two realms. And it enables two groups in different realms to agree on a common group session key with the help of servers. We also gave the security analvsis and computational costs for our protocol.
出处 《计算机科学》 CSCD 北大核心 2009年第3期74-77,共4页 Computer Science
基金 国家自然科学基金资助项目(69874038) 国家高技术研究发展计划(863计划:2001AA115300) 辽宁省自然科学基金(20062023)资助
关键词 不同口令认证 跨域 组密钥交换 Different password authentication,Cross-realm,Group key exchange
  • 相关文献

参考文献20

  • 1Bellovin S, Merrit M. Encrypted key exchange: password based protocols secure against dictionary attacks//Proceedings of the Symposium on Security and Privacy. IEEE, 1992:72-84
  • 2Steiner M, Tsudik G, Waider M. Refinement and extension of encrypted key exchange//ACM Operation Sys. Review, 1995,29 (3) :22-30
  • 3Ding Y, Horster P. Undetectable on-line password guessing attacks. ACM Operating Systems Review, 1995,29(4):77-86
  • 4Lin C, Sun H, Hwang T. Three-party encrypted key exchange: attacks and a solution. ACM Operating Systems Review, 2000, 34(4) : 12-20
  • 5Lin C, Sun H, Steiner M, et al. Three-party Encrypted Key Exchange Without Server Public-Keys. IEEE Communications Letters, IEEE Press, 2001,5 (12) : 497-499
  • 6Byun J W, Jeong I R, Lee D H, et al. Password-authenticated key exchange between clients with different passwords//Proceedings of ICICS' 02. LNCS Vol. 2513. Springer-Verlag, 2002:134-146
  • 7Chen L. A Weakness of the Password - Authenticated Key A - greement between Clients with Different Passwords Scheme// The document was being circulated for consideration at the 27th the SC27/WG2 meeting. Paris, France, 2003-10-20/24
  • 8Kim J Y, Kim S J, Kwak J, et al. Cryptanalysis and Improvement of Password Authenticated Key Exchange between Clients with Different Passwords//ICCSA 2004. LNCS 3043. 2004:895-902
  • 9Denning D, Sacco G. Timestamps in key distribution protocols. Communications of the ACM, 1981,24 (8):533-536
  • 10YoonEn- J, Yoo K - Y. A Secure Password - Authenticated Key Exchange Between Clients with Different Passwords///APWeb Workshops 2006. LNCS 3842. Berlin Heidelberg: Springer-Verlag ,2006:659-663

同被引文献3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部