期刊文献+

标准模型下高效的三方口令认证密钥交换协议 被引量:10

Efficient Three-Party Password-Based Authenticated Key Exchange Protocol in the Standard Model
下载PDF
导出
摘要 三方口令认证密钥交换协议允许两个分别与服务器共享不同口令的用户在服务器的协助下建立共享的会话密钥,从而实现了用户间端到端的安全通信.现阶段,多数的三方口令认证密钥交换协议都是在随机预言模型下可证明安全的.但在实际应用中,利用哈希函数对随机预言函数进行实例化的时候会给随机预言模型下可证明安全的协议带来安全隐患,甚至将导致协议不安全.以基于El Gamal加密的平滑投射哈希函数为工具,在共同参考串模型下设计了一种高效的三方口令认证密钥交换协议,并且在标准模型下基于DDH假设证明了协议的安全性.与已有的同类协议相比,该协议在同等的安全假设下具有更高的计算效率和通信效率,因此更适用于大规模的端到端通信环境. Three-party password authenticated key exchange (3PAKE) protocols allow two clients to establish a common session key via the help of an authentication server. Each client only needs to share a password with the server. The derived session key can be later used to achieve end-to-end secure communications. Most of the existing 3PAKE protocols are proven secure in the random oracle model.However, these protocols may turn out to be insecure in real applications when the random oracle function is instantiated with a concrete hash function. In this paper, an efficient 3PAKE protocol is proposed using smooth projective hash function based on ElGamal public key eneryption. The security of the proposed protocol is conducted in the standard model under the DDH assumption. Compared with other related protocols, this protocol is quite efficient in terms of computation and communication costs under the same security assumption, and as a result, it is more suitable for large-scale end-to-end communication environments.
出处 《软件学报》 EI CSCD 北大核心 2016年第9期2389-2399,共11页 Journal of Software
基金 国家自然科学基金(61309016 61379150 61201220 U1135002 U1405255) 国家高技术研究发展计划(863)(2015AA 016007) 中国博士后科学基金(2014M562493) 陕西省博士后科学基金 信息保障技术重点实验室开放课题(KJ-13-02) 高校基本业务费项目(JB161501) 河南省科技攻关重点项目(092101210502 122102210126)~~
关键词 三方口令协议 标准模型 平滑投射哈希函数 DDH假设 three-party password key exchange protocol standard model smooth projective hash function DDH assumption
  • 相关文献

参考文献25

  • 1Bellovin SM, Merritt M. Encrypted key exchange: Password-Based protocols secure against dictionary attacks. In: Proc. of theIEEE Symp. on Research in Security and Privacy. Los Alamitos: IEEE Computer Society, 1992. 72-84. [doi: 10.1109/RISP.1992. 213269].
  • 2Bellare M, Pointcheval D, Rogaway P. Authenticated key exchange secure against dictionary attack. In: Preneel B,ed. Proc. of the EUROCRYPT 2000. LNCS 1807’ Berlin: Springer-Verlag, 2000. 140-156. [doi: 10.1007/3-540-45539-6—11].
  • 3Boyko V,MacKenzie P, Patel S. Provably secure password-authenticated key exchange using Diffie-Hellman. In: Preneel B, ed. Proc. of the EUROCRYPT 2000. LNCS 1807,Berlin: Springer-Verlag, 2000. 156-171. [doi: 10.1007/3-540-45539-6_12].
  • 4Katz J, Ostrovsky R, Yung M. Efficient password-authenticated key exchange using human-memorable passwords. In: Pfitzmann B, ed. Proc. of the EUROCRYPT 2001. LNCS 2045,Berlin: Springer-Verlag, 2001. 475-494. [doi: 10.1007/3-540-44987-6_29].
  • 5Jiang SQ, Gong G. Password based key exchange with mutual authentication. In: Handschuh H,Hasan A, eds. Proc. of the SAC 2004. LNCS 3357, Berlin: Springer-Verlag, 2004. 267-279. [doi: 10.1007/978-3-540-30564-4—19].
  • 6Canetti R, Halevi S, Katz J, Lindell Y, MacKenzie P. Universally composable password-based key exchange. In: Cramer R, ed. Proc. of the EUROCRYPT 2005. LNCS 3494,Berlin: Springer-Verlag, 2005. 404-421. [doi: 10.1007/11426639一24].
  • 7Lin CL, Sun HM, Hwang T. Three-Party encrypted key exchange: Attacks and a solution. ACM SIGOPS Operation System Review, 2000,34(4):12-20. [doi: 10.1145/506106.506108].
  • 8Lin CL, Sun HM, Steiner M, Hwang T. Three-Party encrypted key exchange without server public-keys. IEEE Communications Letters, 2000,5(12):497-499. [doi: 10.1109/4234.974498].
  • 9Abdalla M, Fouque PA, Pointcheval D. Password-Based authenticated key exchange in the three-party setting. In: Vaudenay S, ed. Proc. of the PKC 2005. LNCS 3386, Berlin: Springer-Verlag, 2005. 65-84. [doi: 10.1007/978-3-540-30580-4一6].
  • 10Abdalla M, Pointcheval D. Interactive Diffie-Hellman assumptions with applications to password-based authentication. In: Patrick AS, ed. Proc. of the FC 2005. LNCS 3570,Berlin: Springer-Verlag, 2005. 341-356. [doi: 10.1007/11507840_31].

同被引文献36

引证文献10

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部