期刊文献+

基于卡梅隆函数的口令认证密钥交换协议

Password-Based Authenticated Key Exchange Protocol Based on Chameleon Hash Function
下载PDF
导出
摘要 口令认证密钥交换协议允许参与者通过一个低熵的共享口令在不安全的网络上进行相互认证并建立安全的会话密钥。文章在非对称"PKI模型"下基于卡梅隆函数提出了一个两方的口令认证密钥交换协议,并且在下证明了协议的安全性。用户和服务器利用卡梅隆函数计算出一个双方共享的秘密值来加强认证,通过两轮交互实现了用户和服务器之间的双向认证。与同类的协议相比,本文中的协议在增加少量计算量的条件下减少了通信轮数,因此特别适用于无线网络环境。 Password-based authenticated key exchange protocols allow users to authenticate each other and securely establish a common secret key over an insecure channel only using a low entropy password. This paper proposes a two-party password-based authenticated key exchange protocol based on chameleon hash function, and proves its security in the random oracle model. The client and the server compute a common secret value by the chameleon hash function to enhance authenti- cation, and the proposed protocol realizes mutual authentication via two-pass communication. Compared with kindred protocols, the proposed protocol is efficient in terms of communication complexity while maintaining almost the same extent of computational complexity. Due to its acceptable computation cost and low communication cost, the proposed protocol is particularly suitable for implementation in the wireless networks.
出处 《信息工程大学学报》 2011年第4期385-390,共6页 Journal of Information Engineering University
基金 国家863计划资助项目(2009AA01Z417) 河南省重大科技攻关项目(092101210502)
关键词 口令认证密钥交换协议 卡梅隆函数 双向认证 随机谕示模型 password-based authenticated key exchange protocol chameleon hash function mutual authentication random oracle model
  • 相关文献

参考文献11

  • 1Bellare M, Pointcheval D, Rogaway P. Authenticated key exchange secure against dictionary attacks [ C ]//Eurocrypt 2000. LNCS 1807, 2000: 139-155.
  • 2Bellare M, Rogaway P. Entity authentication and key distribution[ C]//Crypto 1993. LNCS, 773, 1993: 232-249.
  • 3Bellare M, Rogaway P. Provably secure session key distribution-the three party case[ C ]//The 27th ACM Symposium on Theory of Computing. 1995 : 57-66.
  • 4Bresson E, Chevassut O, Pointcheval D. Simple password-based encrypted key exchange protocols [ C ] //CT-RSA 2005. LNCS 3376, 2005 : 191-208.
  • 5Abdalla M, Polntcheval D. Interactive Diffie-Hellman assumptions with applications to password-based authenticatlon[ C ]// FC 2005. LNCS 3570, 2005: 341-356.
  • 6Abdalla M, Fouque P A. Password-based authenticated key exchange in the three-party setting[ C ] //PKC 2005. LNCS 3386, 2005 : 65-84.
  • 7Canetti R, Halevi S, Katz J, et al. Universally composable password-based key exchange[ C ] //Eurocrypt 2005. LNCS 3494, 2005 : 404-421.
  • 8Bellare M, Catalano D, Chevalier C, et al. Efficient two-party password-based key exchange protocols in the UC framework [C]//CT-RSA 2008. LNCS 4964, 2008: 335-351.
  • 9Park Y, Park S. Two factor authenticated key exchange (TAKE) protocol in public wireless LANs[ J]. IEICE Trans Commun, 2004, E87-B(5):1382-1385.
  • 10Wen Shengjuang, Wu Jinglin. Two efficient two-factor authenticated key exchange protocols in public wireless LANs[ J]. Computers & Electrical Engineering, 2009, 35 ( 1 ) :33-40.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部