期刊文献+

适用于双方频繁通信的密钥交换协议 被引量:1

A novel key exchange protocol for frequent communication
下载PDF
导出
摘要 首先对以前提出的一个高效的基于验证元的三方密钥交换协议进行了安全性分析,指出了它容易受到服务器密钥泄露攻击等安全威胁,且缺乏前向安全性;并以此为基础,针对大多数现存的基于验证元的3PAKE协议均难以抵御服务器密钥泄露攻击的现状,提出了一个新的3PAKE协议。通过安全性分析,证明了新协议比原协议更安全,能够抵御各种已知的攻击,且与现有的大多数同类协议相比具有更高的效率。 Firstly, an efficient verifier-based three-party password-authenticated key exchange protocol previously proposed is analyzed. The protocol is vulnerable to security threats such as server key dis closure attack and so on, and has a lack of forward secrecy. Secondly, on the basis of the analysis, in order to solve the problem that most of existing verifier-based 3PAKE protocols cannot resist server key disclosure attack, a novel 3PAKE protocol is proposed. Through security analysis, the new protocol can be proved to be more secure than the old one, and has the ability to resist all known attacks. In addition, compared with existing protocols, it is more efficient.
出处 《计算机工程与科学》 CSCD 北大核心 2014年第7期1284-1289,共6页 Computer Engineering & Science
基金 国家自然科学基金资助项目(61163025) 内蒙古高等学校科学技术研究资助项目(NJZY12200) 2013年广西研究生教育创新计划资助项目(YCSZ2013042)
关键词 基于验证元 三方密钥交换协议 服务器密钥泄露攻击 会话密钥 前向安全性 verifier-based password-authenticated key exchange protocol for three-party server key disclosure attack session key forward secrecy
  • 相关文献

参考文献12

  • 1胡学先,刘文芬.对两个三方口令认证密钥交换协议的分析[J].信息工程大学学报,2010,11(1):104-107. 被引量:5
  • 2易通,陈宏朝,吴戴林.两个三方密钥交换协议的安全性分析与改进[J].计算机工程与设计,2012,33(12):4482-4486. 被引量:1
  • 3geliovin S M, Merritt M. Encrypted key exchangePassword- based protocols secure against dictionary attacks[C]//Proc of the 1992 1EEE Symposium on Research in Security and Pri- vacy, 1992 : 72- 84.
  • 4Abdalla M,Chevassut O,Fouque P A,et al. A simple thresh- old authenticated key exchange from short secrets[C]//Proc of Asiacrypt'05, 2005 : 566-584.
  • 5Kwon J O, Jeong I R, Sakurai K, et al. Efficienl verifier- based password authenticated key exchange in the three-par- ty setting[J]. Computer Standards and Interfaces, 2007,29 (5):513 520.
  • 6Lu R X, Cao Z F . Simple three-party key exchange protocol [J]. Computer Security, 2007,26(1) :94-97.
  • 7Chung H R, Ku W C. Three weaknesses in a simple three- party key exchange protocol [J ]. Information Science, 2008, 178(1) :220-229.
  • 8Kim H S, Choi J Y. Enhanced password based simple three party key exchange protocol[J ] . Computer Electrical Engi neering, 2009,35(1) :107- 114.
  • 9Liu X M, Zhou F C, Chang G R. Improved key exchange protocol for three party based on verifier authentication[J]. Journal of Southeast Universily(English Edition), 2008, 24 (3) : 322 -324.
  • 10Wen Tang. A simple three party password based key ex- change protocol[C]//Proc of International Conference on Mechanical and Electrical Technology (ICMET, 10), 2010 : 730-732.

二级参考文献20

  • 1Lu R X,Cao Z F.Simple three-party key exchange protocol[J].Computer Security,2007,26(1):94-97.
  • 2Ahdalla M,Pointcheval D.Simple password-based encrypted key exchange protocols[C]//Proc.CT-RSA.2005:191-208.
  • 3Chung H R,Ku W C.Three weaknesses in a simple throe-party key exchange protocol[J].Information Science,2008,178(1):220-229.
  • 4Kim H S,Choi J Y.Enhanced Password-based simple three-party key exchange protocol[J].Comput Electr Eng,2009,35(1):107-114.
  • 5Phan R C W,Goi B M.Cryptanalysis of simple three-party key exchange protocol[J].Information Science,2008,178(8):2849-2856.
  • 6Boyd C,Mathuria A.Protocols for authentication and key establishment[M].Berlin:Springer-Verlag Press,2003:247-266.
  • 7Bellovin S M,Merritt M.Encrypted key exchange:password based protocol secure against dictionary attack[C]//Proc.IEEE symposium on research in security and privacy.1992:72-84.
  • 8MacKenzie P.The PAK suite:Protocols for password authenticated key exchange[R].Technical Report 2002-46,DIMACS,October 202.http://dimacs.rutgers.edu/TechnicalReports/abstract/2002/2002-46.html.
  • 9Wen H A,Lee T F,Hwang T.Provably secure three-party password-based authenticated key exchange protocol using weil paring[J].IEE Proc.Commun,2005,152(2):138-143.
  • 10Nam J,Lee Y,Kim S,Won D.Security weakness in a three-party paring-baaed protocol for password authenticated key exchange[J].Information Science,2007,177(6):1364-1375.

共引文献4

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部