期刊文献+

认证密钥协商协议的研究与分析 被引量:1

Research and Analysis on Authenticated key Agreement Protocol
下载PDF
导出
摘要 介绍了身份认证的概念与途径,总结了认证密钥协商协议设计的基本原则;阐述了密钥协商协议中常见的攻击以及设计安全协议应该实现的目标。 First we introduce the concept and means of identity authentication, and summarizes basic principles of negotiation protocol design of the authenticated key; then we describe should realize the key agreement protocol attacks and security protocol design goals.
出处 《计算机安全》 2013年第4期43-46,共4页 Network & Computer Security
关键词 身份认证 认证密钥协商协议 安全协议 Identity authentication Authenticated key Agreement protocol Security protocol
  • 相关文献

参考文献4

二级参考文献31

  • 1殷胤,李宝.标准模型下可证安全的加密密钥协商协议[J].软件学报,2007,18(2):422-429. 被引量:9
  • 2FENG DengGuo CHEN WeiDong.Modular approach to the design and analysis of password-based security protocols[J].Science in China(Series F),2007,50(3):381-398. 被引量:4
  • 3Bellovin S and Merritt M. Encrypted key exchange: password-based protocol secure against dictionary attacks[C]. Proceedings of the 1992 Conference IEEE computer society symp. on Research in security and privacy, Oakland, USA, 1992: 72-84.
  • 4Bellare M, Pointcheval D, and Rogaway P. Authenticated key exchange secure against dictionary attacks[C]. Proceedings of EUROCRYPT 2000, Bruges, Belgium, LNCS 1807: 139-155.
  • 5Abdalla M, Chevassut O, and Pointcheval D. One-time verifier-based encrypted key exchange[C]. Proceedings of PKC 2005, Les Diablerets, Switzerland, LNCS 3386: 47-64.
  • 6Abdalla M and Pointcheval D, Simple password-based encrypted key exchange protocols[C]. Proceedings of CT-RSA 2005, San Francisco, USA, LNCS 3376: 191-208.
  • 7Shao Jun, Cao Zhen fu, and Wang Li cheng. Efficient password-based authenticated key exchange without Public information[C]. Proceedings of ESORICS 2007, Dresden, Germany, LNCS 4734: 299-310.
  • 8Katz J, Ostrovsky R, and Yung M. Efficient password-authentication key exchange using human- memorable passwords[C]. Proceedings of EUROCRYPT 2001 Innsbruck, Austria, LNCS 2045: 475-494.
  • 9Jiang S Q and Gong G. Password based key exchange with mutual authentication[C]. Proceedings of SAC 2004, Nicosia, Cyprus, LNCS 3357: 267-279.
  • 10Bellovin SM,Merritt M.Encrypted key exchange:Password-Based protocols secure against dictionary attacks.In:Proc.of the 1992 IEEE Computer Society Symp.on Research in Security and Privacy.Oakland:IEEE Computer Society,1992.72-84.

共引文献16

同被引文献15

引证文献1

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部