期刊文献+

一种简单的口令基三方密钥交换协议 被引量:1

Password-based Simple Three-party Key Exchange Protocol
下载PDF
导出
摘要 三方密钥交换协议是双方交换协议的推广,现存的大多数三方密钥交换协议都是用户—用户—服务器模式的,此类协议大多不能抵抗不可检测的口令猜测在线攻击。为此构造一个改进的口令基三方密钥交换协议。该改进协议较为复杂且两用户间需要3轮交换。为提高效率,基于CDH与DDH等基本的密码学假设,提出一个简单的口令基三方密钥交换协议。在AIP模型下证明该协议的安全性。 Three-party Password-Based Key Exchange(PBKE) protocols are extended from two/PBKE protocols for three-party environments. Most existing three-PBKE protocols are designed for the user-user-server architecture, in which each user shares his password with a trusted server. Kim and Choi reveales many three-PBKE protocols' weakness in resisting undetectable on-line password guessing attack, and proposes an enhanced protocol to resist the described attack. However, it is inefficient and needs three rounds interaction between the two users. This paper presents an efficient construction for three-PBKE, and proves its security in AIP model.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第8期112-114,共3页 Computer Engineering
基金 国家自然科学基金资助项目(10771078) 山东省高等学校科技计划基金资助项目(J09LA51) 鲁东大学校科研基金资助项目(L20082702)
关键词 口令基密钥交换协议 AIP模型 不可检测的口令猜测在线攻击 三方密钥交换协议 Password-Based Key Exchange(PBKE) AIP model undetectable on-line password guessing attack three-PBKE protocol
  • 相关文献

参考文献11

  • 1Bellovin S M, Merritt M. Encrypted Key Exchange: Password-based Protocols Secure Against Dictionary Attacks[C]//Proc. of the 1992 IEEE Symposium on Research in Security and Privacy. Oakland, USA: IEEE Press, 1992: 72-84.
  • 2Kim H S, Choi J Y. Enhanced Password-based Simple Three-party Key Exchange Protocol[J]. Computers and Electrical Engineering, 2009, 35(1): 107-114.
  • 3Ding Yun, Horster R Undetectable On-line Password Guessing Attacks[J]. ACM Operation System Review, 1995, 29(4): 77-86.
  • 4王天芹.基于口令的认证密钥交换协议[J].计算机工程,2008,34(14):4-6. 被引量:3
  • 5Steiner M, Tsudik G, Waider M. Refinement and Extension of Encrypted Key Exchange[J]. ACM Operating System Review, 1995, 29(3): 22-30.
  • 6Lee Tianfu, Hwanga T, Lin Chun-li. Enhanced Three-party Encrypted Key Exchange Without Server Public Keys[J]. Computer Security, 2004, 23(7): 571-577.
  • 7Wen H A, Lee TianfFu, Hwang T. Provably Secure Three-party Password-based Authenticated Key Exchange Protocol Using Weil Pairing[J]. IEE Proceedings of Communication, 2005, 152(2): 138-143.
  • 8Nam J, Lee Y, Kim S, et al. Security Weakness in a Three-party Pairing-based Protocol for Password Authenticated Key Exchange[J]. Information Science, 2007, 177(6): 1364-1375.
  • 9Lu Rongxing, Cao Zhenfu. Simple Three-party Key Exchange Protocol[J]. Computer Security, 2007, 26(1): 94-97.
  • 10Abdalla M, Izabachene M, Pointcheval D. Anonymous and Transparent Gateway-based Password-authenticated Key Exchange[C]//Proc. of CANS'08. [S. l.]: Springer-Verlag, 2008: 133-148.

二级参考文献7

  • 1Bellovin S M, Merrit M. Encrypted Key Exchange: Password-based Protocols Secure Against Dictionary Attacks[C]//Proc. of IEEE Symposium on Research in Security and Privacy. Oakland, CA, USA: [s. n.], 1992.
  • 2Jablon D. Strong Password-only Authenticated Key Exchange[J]. ACM Computer Communication Review, 1996, 26(5): 5-20.
  • 3Lin Chunli, Sun Hungmin, Tzonelih H. Three-party Encrypted Key Exchange: Attacks and a Solution[J]. ACM Operating Systems Review, 2000, 34(4): 12-20.
  • 4Ford W, Kaliski J B S. Server-assisted Generation of a Strong Screte from a Password[C]//Proceedings of the 5th IEEE International Workshop on Enterprise Security. Los Alamitos, CA, USA: IEEE Computer Society Press, 2000.
  • 5Jablon D. Password Authentication Using Multiple Servers[M]. [S. l.]: Spring-Verlag, 2001.
  • 6MacKenzie P, Shrimpton T, Jakobsson M. Threshold Passwordauthenticated Key Exchange[J]. Journal of Cryptology, 2006, 19(1): 27-66.
  • 7Stinson D R. Cryptography: Theory and Practice[M]. New York, USA: CRC Press, 1995.

共引文献2

同被引文献10

  • 1Bellovin S M, Merritt M. Encrypted key exchange: Pass word-based protocols secure against dictionary attacks [ C ]//Proceedings of the 1992 IEEE Computer Society Symposium on Research in security and Privacy. Oakland, California, USA, 1992:72 - 84.
  • 2Steiner M, Tsudik G, Waidner M. Refinement and extension of en- crypted key exchange[ J]. ACM Operating Systems Review, 1995, 29 (3) : 22-30.
  • 3Ding Y, Horster P. Undetectable on-line password guessing attacks [J]. ACM Operating Systems Review, 1995, 29 (4) : 77 -86.
  • 4Lin C L, Sun H M, Hwang T. Three party-encrypted key exchange: Attacks and a solution[ J]. ACM Operating Systems Review, 2000, 34 (4) : 12 -20.
  • 5Sun H M, Chert B C, Hwang T. Secure key agreement protocols for three-party against guessing attacks [ J ]. The Journal of Systemsand Software, 2003, 75 (1/2): 63-68.
  • 6Nam J, Kim S, Won D. A weakness in SunChenHwang three party key a- greement protocols using passwords [ R/OL] . 2004 - 12 - 14. http:// eprint, iacr. org/ 2004/ 348.
  • 7Lee S W, Kim H S, Yoo K Y. Efficient verifier-based key agreement pro- tocol for three parties without server's public key[J]. Applied Mathemat- ics and Computation, 2005,167( 1 ) :996 - 1003.
  • 8Liu X M, Zhou F C, Chang G R. Improved key exchange protocol for three-party based on verifier authentication [ J ]. Journal of Southeast U- niversity : 2008, 24 ( 3 ) : 322 - 324.
  • 9李文敏,温巧燕,张华.基于验证元的三方口令认证密钥交换协议[J].通信学报,2008,29(10):149-152. 被引量:14
  • 10邓少锋,邓帆,李益发.两个三方口令密钥交换协议的安全性分析[J].计算机工程与应用,2011,47(10):101-105. 被引量:4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部