期刊文献+

通用可组合安全的匿名认证密钥交换协议

Anonymous authentication key exchange protocol with universally composable security
下载PDF
导出
摘要 针对智能卡登录系统中远程身份认证和密钥交换问题,提出一种具有通用可组合安全的基于口令的匿名认证密钥交换协议——πpAKE.该协议采用匿名技术进行登录认证及信息存储管理,使用Diffie-Hellman(DH)算法实现数据交换,同时生成临时会话密钥.由此节省了登录的运算开销,且协议具有前向安全性.研究从形式化论证角度出发,利用通用可组合安全认证理想函数FAUTH模型和密钥交换理想函数FKE模型,构建πpAKE的通用可组合安全模型,并在此模型下,对πpAKE安全性进行论证,结果表明,该协议具有通用可组合的安全性能. Focusing on remote entity authentication and key exchange with smart cards,this paper proposed a password-based anonymous authentication key exchange protocol with universally composabe security——πpAKE.In this protocol the anonymous technology was used for login,authentication and management of information storage.Diffie-Hellman(DH)algorithm was in troduced to realize the data exchange and generates the session key so as to reduce the computational cost when login.The protocol has forward security.For the purpose of formalization,this paper established an universally-composable security model for πpAKE based on the model of ideal function for authentication FAUTH and key exchange FKE,and demonstrated the security of πpAKE under the model.The verification results have demonstrated the universally composable security of this sprotocol.
出处 《深圳大学学报(理工版)》 EI CAS 北大核心 2010年第4期402-407,共6页 Journal of Shenzhen University(Science and Engineering)
基金 国家自然科学基金资助项目(61071038) 广东省自然科学基金资助项目(9151027501000076)~~
关键词 通信技术 信息安全 远程身份认证 密钥交换协议 会话密钥 通用可组合安全 口令认证 communication technology information security remote entity authentication key exchange session key universally composable security password authentication
  • 相关文献

参考文献6

二级参考文献121

  • 1钟旭,陆浪如,南相浩,洪泽勤.一种基于种子密钥SPK的IBE加密体制设计方案[J].微计算机信息,2005,21(4):226-227. 被引量:12
  • 2梅其祥,何大可.标准模型下的抗选择密文攻击基于身份门限解密方案[J].中国科学院研究生院学报,2006,23(2):198-204. 被引量:3
  • 3李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 4Shamir A.Identity-Based Cryptosystems and Signature Schemes[M]// LNCS:Advances in Cryptology-CRYPTO84.Berlin:Springer-Verlag Press,1985:47-53.
  • 5ZHENG Yu-liang.Digital Signcryption or How to Achieve Cost(Signature & Encryption)  Cost(Signature)+Cost(Encryption)[M]//LNCS:Advances in Cryptology-Crypto97.Berlin:Springer-Verlag Press,1997:165-179.
  • 6Yum B H,Lee P J.New Signcryption Schemes Based on KCDSA[M]//LNCS:Proc of ICISC01.Berlin:Springer-Verlag Press,2001:305-317.
  • 7Libert B,Quisquater J J.Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups[M]//PKC 2004.Berlin:Springer-Verlag Press,2004:187-200.
  • 8Libert B,Quisquater J J.Improved Signcryption from q-Diffie-Hellman Problems[M]//LNCS:Security Communication Networks-SCN04.Berlin:Springer-Verlag Press,2005:220-234.
  • 9MA Chang-she.Efficient Short Signcryption Scheme with Public Verifiability[M]//LNCS:Inscrypt 2006.Berlin:Springer-Verlag Press,2006:118-129.
  • 10Malone-Lee J.Identity based signcryption[DB/OL].[2007-12-01]Cryptology ePrintArchive.http://eprint.iacr.org/2002/098.pdf.2002.

共引文献135

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部