期刊文献+

一种强安全性的多密钥交换协议 被引量:1

Multiple Key Exchange Protocol with Strong Security
下载PDF
导出
摘要 当前的两方多密钥交换协议都不能抵抗临时密钥泄露攻击。针对该问题,基于双线性对提出一种新的两方认证密钥交换协议。协议中参与会话的2个用户通过一次会话可以生成4个不同的会话密钥。分析结果表明,该协议可以抵抗临时密钥泄露攻击,与已有同类协议相比,具有更强的安全性,能实现双向认证功能。 All existing two party multiple key exchange protocols cannot resist ephemeral key compromise attack.To solve this problem,a new two party authenticated key exchange protocol based bilinear map is proposed for enhancing the security and efficiency of two party key exchange protocols.Four different session keys can be computed through one session of the proposed protocol.Compared with existing protocols,the new protocol with stronger security can resist ephemeral key compromise attack and provide mutual authentication.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第22期110-111,共2页 Computer Engineering
基金 国家"863"计划基金资助项目(2009AA01Z417)
关键词 密钥交换 双向认证 临时密钥泄露攻击 长期密钥泄露伪装攻击 key exchange mutual authentication ephemeral key leakage attack long-term key leakage impersonation attack
  • 相关文献

参考文献6

  • 1Harn L,Lin H Y.Authenticated Key Agreement Without Using One-way Hash Functions[J].Electronic Letters,2001,37(10): 629-630.
  • 2Shim K.Unknown Key-share Attack on Authenticated Multiple- key Agreement Protocol[J].Electronic Letters,2003,39(1): 38-39.
  • 3Zhou Hongsheng,Fan Lei,Li Jianhua.Remarks on Unknown Key-share Attack on Authenticated Multiple-key Agreement Protocol[J].Electronics Letters,2003,39(17): 1248-1249.
  • 4Lee Narn-Yih,Wu Chien-Nan,Wang Chien-Chih.Authenticated Multiple Key Exchange Protocols Based on Elliptic Curves and Bilinear Pairings[J].Computers and Electrical Engineering,2008,34(1): 12-20.
  • 5Vo D L,Lee H,Yeun C Y,et al.Enhancements of Authenticated Multiple Key Exchange Protocol Based on Bilinear Pairings[J].Computers and Electrical Engineering,2010,36(1): 155-159.
  • 6卞仕柱,王建东,任勇军,方黎明,夏金月.强安全高效的认证密钥交换协议[J].计算机工程,2010,36(7):136-138. 被引量:4

二级参考文献6

  • 1Bellarc M, Rogaway P. Entity Authentication and Key Distribution[C]//Proc. of CRYPTO'93. [S. I.]: Springer, 1993: 232.
  • 2LaMaccbia K, Lauter K, Mityagin A. Stronger Security of Authenticated Key Exchange[C]//Proc. of ProvSec'07: Heidelberg, Germany: Springer, 2007: 1-16.
  • 3Cash D, Kiltz E, Shoup V. The Twin Diffie-Heltman Problem and Applications[C]//Proc. of EUROCRYPT'08. Heidelberg, Germany: Springer, 2008: 127-145.
  • 4Ustaoglu B. Obtaining a Secure and Efficient Key Agreement Protocol for (H)MQV and NAXOS[J]. Designs, Codes and Cryptography, 2008, 46(3): 329-342.
  • 5Krawczyk H. HMQV: A High-performance Secure Diffie-Hellman Pretocol[C]//Proc. of CRYPTO'05. Heidelberg, Germany: Springer, 2005: 546-566.
  • 6Lee J, Park J. Authenticated Key Exchange Secure Under the Computational Diffie-Hellman Assumption[EB/OL]. (2009-04-08). http://eprint.iacr.org/2008/344.

共引文献3

同被引文献2

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部