期刊文献+

一种抗DoS攻击的密钥交换协议

A New Authenticated Key Exchange Protocol with DoS Resilience
下载PDF
导出
摘要 对meCK模型进行了扩展,增加了抵抗拒绝服务(DoS)攻击的能力。提出了一种抵抗拒绝服务攻击的密钥交换协议并分析了协议的各种安全属性。通过分析发现所给协议不但满足一般的安全需求而且具有抵抗拒绝服务攻击安全性以及抵抗临时密钥泄露安全性,与同类协议DoS-CMQV相比较,在保持相等通信与计算效率的同时具有更强的安全性。 This paper proposes the extension of meCK model for the design and analysis of authenticated key exchange(AKE) protocols.In the new model,the authors add the DoS resilience and present a new AKE protocol,which can reach DoS resilience and others fundamental security attributes.Compared with DoS-CMQV protocol,the new protocol with stronger security keeps the same efficiency.
出处 《北京大学学报(自然科学版)》 EI CAS CSCD 北大核心 2010年第5期720-724,共5页 Acta Scientiarum Naturalium Universitatis Pekinensis
基金 国家高技术研究发展计划专项经费(2009AA01Z417) 河南省重大科技攻关项目(092101210502)资助
关键词 密钥交换 安全模型 DoS安全性 authenticated key exchange security model DoS resilience
  • 相关文献

参考文献11

  • 1Krawczyk H. HMQV: a high-performance secure Diffie- Hellman protocol //Shoup V. Proceeding of CRYPTO 2005. Berlin: Springer-Verlag, 2005 : 546-566.
  • 2LaMacchia B, Lauter K, Mityagin A. Stronger security of authenticated key exchange //Susilo W. Proceeding of ProvSee 2007. Berlin : Springer-Verlag, 2007 : 1-16.
  • 3Canetti R, Krawczyk H. Analysis of key-exchange protocols and their use for building secure channels // Pfitzmann B. Proceeding of EUROCRYPT 2001. Berlin: Springer-Verlag, 2001:453-474.
  • 4Ustaoglu B. Obtaining a secure and eficient key agreement protocol from (H) MQV and NAXOS. Designs, Codes and Cryptography, 2008, 46 (3) : 329 - 342.
  • 5Lee J, Park J H. Authenticated key exchange secure under the computational Diffie-Hellman assumption [EB/OL]. (2008-08-11) [2010-05-15]. http: //eprint, iacr. org / 2008 / 344.
  • 6Lee J, Park C S. An efficient authenticated key exchange protocol with a tight security reduction [ EB/ OL]. (2008-08-11) [2010-05-15]. http: //eprint. iacr. org / 2008 / 345.
  • 7Wu Jiang, Ustaoglu B. Efficient key exchange with tight security reduction [ EB/OL]. (2009-06-16) [2010-05- 15 ]. http : //eprint. iacr. org / 2009/288.
  • 8Moriyama D, Okamoto T. An eCK-secure authenticated key exchange protocol without random oracles // Pieprzyk J. Proceeding of ProvSec 2009, LNCS 5848. Guangzhon, 2009:154-167.
  • 9Stebila D, Ustaoglu B. Towards denial-of-service - resilient key agreement protocols// Boyd C. Proceeding of ACISP 2009. Berlin: Springer-Verlag, 2009: 389- 406.
  • 10Cheng Qingfeng, Ma Chuangui, Hu Xuexian. A new strongly secure authenticated key exchange protocol // Park J H. Proceeding of ISA 2009. Berlin: Springer- Verlag, 2009:135-144.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部