期刊文献+

Provably Secure Authenticated Diffie-Hellman Key Exchange for Resource-Limited Smart Card 被引量:1

Provably Secure Authenticated Diffie-Hellman Key Exchange for Resource-Limited Smart Card
原文传递
导出
摘要 Authenticated Diffie-Hellman key agreement is quite popular for establishing secure session keys. As resource-limited mobile devices are becoming more popular and security threats are increasing, it is desirable to reduce computational load for these resource-limited devices while still preserving its strong security and convenience for users. In this paper, we propose a new smart-card-based user authenticated key agreement scheme which allows users to memorize passwords, reduces users' device computational load while still preserves its strong security. The proposed scheme effectively improves the computational load of modular exponentiations by 50%, and the security is formally proved. Authenticated Diffie-Hellman key agreement is quite popular for establishing secure session keys. As resource-limited mobile devices arc becoming more popular and security threats are increasing, it is desirable to reduce computational load for these resource-limited devices while still preserving its strong security and convenience for users. In this paper, we propose a new smart-card-based user authenticated key agreement scheme which allows users to memorize passwords, reduces users' device computational load while still preserves its strong security. The proposed scheme effectively improves the computational load of modular exponentiations by 50%, and the security is formally proved.
作者 简宏宇
出处 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期436-439,共4页 上海交通大学学报(英文版)
基金 the National Science Council(No.NSC102-2221-E-260-011)
关键词 DIFFIE-HELLMAN key agreement forward secrecy AUTHENTICATION PASSWORD Diffie-Hellman, key agreement, forward secrecy, authentication, password
  • 相关文献

参考文献13

  • 1SANDIRIGAMA M, SHIMIZU A, NODA M T. Simple and secure password authentication protocol (SAS) [Jl. IEICE Transactions on Communications, 2000, E83- B(6): 1363-1365.
  • 2CHIEN H Y, JAN J K, TSENG Y M. A modified re- mote login authentication scheme based on geometric approach [J]. The Journal of Systems and Software, 2001, 55: 287-290.
  • 3SUN H M, LI L H. An efficient remote user authentica- tion scheme using smart cards [J]. IEEE Transactions on Consumer Electronics, 2000, 46(4): 958-961.
  • 4Wu T C. Remote login authentication scheme based on a geometric approach [J]. Computer Communica- tions, 1995, 18(12): 959-963.
  • 5HWANG M S. Cryptanalysis of a remote login authen- tication scheme [J]. Computer Communications, 1999, 22(8): 742-744.
  • 6BELLARE M, CANETTI R, KRAWCZYK H. A modular approach to the design and analysis of authentication and key exchange protocols [C]//Proceeding8 of 30th Annual Symposium on the Theory of Computing. New York, USA: ACM, 1998: 419-428.
  • 7BELLARE M, POINTCHEVAL D, ROGAWAY P. Authen- ticated key exchange secure against dictionary attacks [J]. Lecture Notes in Computer Science, 2000, 1807: 139-155.
  • 8DING Y, HORSTER P. Undetectable on-line password guessing attacks [J]. ACM Operating Systems Review, 1995, 29(4): 77-86.
  • 9BRUSILOVSKY A, FAYNBERG I, ZELTSAN Z, et al. RFC683-password-aut henticated key (PAK) Diffie-Hellman exchange [EB/OL]. (2013-10-30). http://t ools.iet f.org/ html/rfc5683.
  • 10BOYKO V, MACKENZIE P, PATEL S. Provably se- cure password authenticated key exchange using Diffie- Hellman [J]. Lecture Notes in Computer Science, 2000, 1807: 156-171.

同被引文献5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部