期刊文献+

强安全两方认证密钥协商方案 被引量:2

Strongly secure two party authenticated key agreement scheme
下载PDF
导出
摘要 提出一个新的强安全认证密钥协商方案。新方案满足抗密钥泄露伪装、已知会话临时信息安全和抗哈希值泄露攻击等特性,只要每方至少有一个未泄露的秘密,那么新方案在eCK模型下就是安全的,而且新方案是已知同类方案中运算量最少的。 This paper proposed a new strongly secure AKA scheme.The new scheme satisfied many known desirable security properties for AKA including resistance to key-compromise impersonation(KCI)attacks,resilience to the leakage of known session-specific temporary information and the leakage of hash values.The new scheme was secure in the eCK model as long as each party had at least one uncompromised secret,what's more,the new scheme enhanced the computational efficiency.
出处 《计算机应用研究》 CSCD 北大核心 2011年第3期1133-1135,共3页 Application Research of Computers
基金 国家"863"计划资助项目(2009AA01Z415)
关键词 扩展CK安全模型 强安全 认证密钥协商 两方 eCK secure model strongly secure AKA two party
  • 相关文献

参考文献14

  • 1BELLARE M,ROGAWAY P.Entity authentication and key distribution[C] //Proc of the 13th Annual International Cryptology Conference on Advances in Cryptology.1994:232-249.
  • 2CANETTI R,KRAWCZYK H.Analysis of key-exchange protocols and their use for building secure channels[C] //Proc of EUROCRYPT 2001.London:Springer,2001:453-474.
  • 3KUDLA C,PATERSON K.Modular security proofs for key agreement protocols[C] //Lecture Notes in Computer Science,vol 3778.[S.l.] :Springer-Verlag,2005:549-565.
  • 4LaMACCHIA B A,LAUTER K,MITYAGIN A.Stronger security of authenticated key exchange[C] //Proc of LNCS,vol 4784.2007:1-16.
  • 5OKAMOTO T.Authenticated key exchange and key encapsulation in the standard model[C] //Proc of ASIACRYPT 2007.Heidelberg:Springer,2007:474-484.
  • 6LEE J,PARK J H.Authenticated key exchange secure under the computational Diffie-Hellman assumption,Report 2008/344[R].[S.l.] :Cryptology ePrint Archive,2008.
  • 7LEE J,PARK C S.An efficient authenticated key exchange protocol with a tight security reduction,Report 2008/345[R].[S.l.] :Cryptology ePrint Archive,2008.
  • 8HUANG Hai,CAO Zhen-fu.Strongly secure authenticated key exchange protocol based on computational Diffie-Hellman problem[EB/ OL].(2008).http://eprint.iacr.org/2008/500.
  • 9CHENG Qing-feng,MA Chuan-gui,HU Xue-xian.A new strongly secure authenticated key exchange protocol[C] //Proc of ISA 2009.Berlin:Springer-Verlag,2009:135-144.
  • 10MORIYAMA D,OKAMOTO T.An eCK-socure authenticated key exchange protocol without random oracles[C] //Proc of the 3rd International Conference on Provable Security.Berlin:Springer-Verlag,2009:154-167.

同被引文献17

  • 1DIFFIE W, HELLMAN M E. New directions in cryptography [ J ]. IEEE Trans on Information Theory,1976,22(6) :644-654.
  • 2BELLARE M, ROGAWAY P. Entity authentication and key distribu- tion [ C ]//Proc of the 13 th Annual International Crytology Conference on Advance in Cryptology. Berlin: Springer-Verlag, 1993:232-249.
  • 3CANETTI R, KRAWCZYK H. Analysis of key-exchange protocols and their use for building secure channels[ EB/OL]. [ 2011-04-08 ]. http: //eprint. icar. org/2001/040.
  • 4LaMACCH[A B, EAUTER K, MITYAGIN A. Stronger security of au- thenticated key exchange[ C ]//Proc of the 1st International Confer- ence on Provable Security. Berlin: Springer-Verlag, 2007:1-16.
  • 5USTAOGLU B. Obtaining a secure and efficient key agreement proto- col for (H)MOV and NAXOS[ J ]. Designs, Codes and Cryptog- raphy,e008,46 (3) : 329- 342.
  • 6LEE J Y, PARK C S. An efficient authenticated key exchange proto- col with a tight security reduction [ EB/OL]. [ 2011- 04- 08 ]. http : //eprint. icar. org/2008/345.
  • 7CHENG Qing-feng, MA Chuan-gui. A new strongly secure authenti- cated key exchange protocol[ C ]//Proc of the 3rd International Con- ference and Workshops on Advances in Information Security and As- surance. Berlin: Springer-Verlag,2009:135-144.
  • 8Diffie W,Hellman M E.New Directions in Cryptography[J].IEEE Transaction on Information Theory,1976,22(6):644-654.
  • 9Diffie W,Oorschot V,Wiener M J.Authentication and Authenticated Key Exchanges[J]. Designs, Codes and Cryptography,1992,30(3):107-125.
  • 10Canetti R.Krawczyk H.Analysis of Key-exchange Protocols and Their Use for Building Secure Channels[EB/OL].[2011-04-08].http://eprint.icar.org/2001/040.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部