期刊文献+

标准模型下隐私保护的多因素密钥交换协议? 被引量:5

Privacy-Preserving Multi-Factor Key Exchange Protocol in the Standard Model
下载PDF
导出
摘要 多因素认证密钥交换协议融合多种不同的认证因素来实现强安全的身份认证和访问控制,在具有高级别安全应用需求的移动泛在服务中具有巨大的应用潜力.现阶段多因素协议的研究成果还不丰富,并且已有协议都是在随机预言模型下可证明安全的.以两方口令认证密钥交换协议、鲁棒的模糊提取器以及签名方案为基本组件提出了一个标准模型下可证明安全的多因素协议.协议中服务器不知道用户的生物模板,因此实现了对生物信息的隐私保护.与已有的随机预言模型下的多因素协议相比,该协议在满足更高安全性的同时具有更高的计算效率和通信效率,因此更满足高级别安全的移动泛在服务的应用需求. Multi-factor authenticated key exchange (MFAKE) protocols combine different authentication factors to realize strong secure identity authentication and access control, and have great application potential in mobile ubiquitous services with high-level security requirements. Until now, literatures about MFAKE protocols are rare and far from satisfactory. Moreover, existing multi-factor authenticated key exchange protocols are proven secure only in the random oracle model. The study proposes a MFAKE protocol using two-party password authenticated key exchange protocols, fuzzy extractors and signature schemes as building blocks. The security of this MFAKE protocol is conducted in the standard model. The server does not need to know the biometric template of the user, thus the biometric privacy of the user is preserved. Compared with existing MFAKE protocols, our protocol achieves stronger security with lower computation and communication costs. Consequently, the proposed protocol is more suitable for mobile ubiquitous services with high-level security requirements.
出处 《软件学报》 EI CSCD 北大核心 2016年第6期1511-1522,共12页 Journal of Software
基金 国家自然科学基金(61309016,61379150,61201220,U1135002,U1405255) 国家高技术研究发展计划(863)(2015AA011704) 中国博士后科学基金(2014M562493) 陕西省博士后科学基金 信息保障技术重点实验室开放课题(KJ-13-02) 高校基本业务费项目(JB161501) 河南省科技攻关重点项目(092101210502,122102210126)
关键词 多因素认证密钥交换协议 标准模型 模糊提取器 签名方案 multi-factor authenticated key exchange protocol standard model fuzzy extractor signature scheme
  • 相关文献

参考文献20

  • 1Spantzel A, Squicciarini A, Bertino E. Privacy preserving multi-factor authentication with biometrics. In: Proc. of the 2nd ACM Workshop on Digital Identity Management (DIM 2006). New York: ACM, 2006. 63-72. [doi: 10.1145/1179529.1179540].
  • 2Pointcheval D, Zimmer S. Multi-Factor authenticated key exchange. In: Bellovin M, et al., eds. Proc. of the Applied Cryptography and Network Security (ACNS 2008). LNCS 5037, Berlin: Springer-Verlag, 2008. 277-295. [doi: 10.1007/978-3-540-68914-0_17].
  • 3Fan CI, Lin YH. Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics. IEEE Trans. on Information Forensics and Security, 2009, 4 (4) :933-945 . [doi:10.1109/TIFS.2009.2031942].
  • 4Stebila D, Udupi P, Chang S. Multi-Factor password-authenticated key exchange. In: Proc. of the CRPIT 2010. New York: ACM, 2010. 56-66.
  • 5Bellare M, Pointcheval D, Rogaway P. Authenticated key exchange secure against dictionary attack. In: Preneel B, ed. Proc. of the EUROCRYPT 2000. LNCS 1807, Berlin: Springer-Verlag, 2000. 139-155. [doi: 10.1007/3-540-45539-6_11].
  • 6Liu Y, Wei FS, Ma CG. Multi-Factor authenticated key exchange protocol in the three-party setting. In: Lai XJ, et al., eds. Proc. of the 6th China Int'l Conf. on Information Security and Cryptology (Inscrypt 2010). LNCS 6584, Berlin: Springer-Verlag, 2011. 255-267. [doi: 10.1007/978-3-642-21518-6_18].
  • 7Huang XY, Yang X, Chonka A, Zhou JY, Deng RH. A generic framework for three-factor authentication: Preserving security and privacy in distributed systems. IEEE Trans. on Parallel and Distributed Systems, 2011, 22 (8) :1390-1396 . [doi:10.1109/TPDS.2010.206].
  • 8Dodis Y, Reyzin L, Smith A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin C, Camenisch J, eds. Advances in Cryptology-CEUROCRYPT 2004. LNCS 3027, Berlin: Springer-Verlag, 2004. 523-540. [doi: 10.1007/978-3-540-24676-3_31].
  • 9Hao F, Clarke D. Security analysis of a multi-factor authenticated key exchange protocol. In: Bao F, Samaratieds P, Zhou JY, eds. Proc. of the Applied Cryptography and Network Security (ACNS 2012). LNCS 7341, Berlin: Springer-Verlag, 2012. 1-11. [doi: 10.1007/978-3-642-31284-7_1].
  • 10Yang DX, Yang B. A novel multi-factor authenticated key exchange scheme with privacy preserving. Journal of Internet Services and Information Security, 2012, 1 (2/3) :44-56 .

同被引文献25

引证文献5

二级引证文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部