期刊文献+

基于移动端协助的硬口令认证密钥交换协议 被引量:1

Hardened password-authenticated key exchange protocol based on mobile phone assistance
下载PDF
导出
摘要 针对现有口令认证密钥交换协议易受各种网络攻击,影响用户私密信息安全的问题,提出一种基于移动端协助的硬口令认证密钥交换协议,在移动端的辅助下,允许用户使用单一口令建立与服务器之间的安全会话。协议中,用户无须记忆任何复杂的私钥信息,即使移动设备丢失、被盗或遭受恶意软件侵袭,也不会损害用户信息。安全性和性能分析表明,协议明显降低了服务器的计算消耗,大大提高了用户私密信息的安全性,可以抵御字典攻击、中间人攻击等的影响,减轻用户记忆负担,缓解存储压力,易于部署。 Aiming at the vulnerability to various network attacks and effect on the security of user’s private information in the exciting password-authenticated key exchange protocols,this paper proposed a hardened password-authenticated key exchange protocol based on mobile phone assistance,which allowed a user to use a single password to establish a secure session to the server with the help of mobile phone.The users don’t need to memorize any complex private key in the protocol.Even when the mobile device is lost or stolen,even attacked by malware,no damage to the user’s information will be induced.The analysis of security and performance show that the proposed protocol significantly reduces the computation cost of the server and greatly improves the security of the user’s secret information.Meanwhile,the proposed protocol can resist dictionary attacks,man-in-themiddle attacks etc.while lightening burden of the user’s memory,reducing the storage pressure along with easy deployment.
作者 徐渊 Xu Yuan(Dept.of Laboratory Management,Xi’an University of Finance&Economics,Xi’an 710100,China)
出处 《计算机应用研究》 CSCD 北大核心 2020年第7期2108-2111,共4页 Application Research of Computers
基金 国家重点研发计划(原“973”计划)资助项目(2017YFGX110123) 国家自然科学基金—面上项目(61672415) 111基地专项基金资助项目(B16037)。
关键词 认证密钥交换 口令 移动 恶意软件 authenticated key exchange protocol password mobile malware
  • 相关文献

参考文献3

二级参考文献14

  • 1A Akavia,S Goldwasser,V Vaikunmnathan.Simultaneous hardcore bits and cryptography against memory attacks[A].Proceedings of the 6th Theory of Cryptography Conference (TCC 2009)[C].Berlin:Spdnge-Verlag,2009.474-495.
  • 2B Lamacchia,K Lauter,A Mityagin.Stronger security of authenticated key exchange[A].Proceedings of ProvSec 2007[C].Berlin:Springe-Verlag,2007.1-16.
  • 3J Alwen,Y Dodis,D Wichs.Leakage-resilientpublic-key cryptography in the bounded-retrieval model[A].Advances in Cryptology,Crypto 2009[C].Berlin:Springe-Verlag,2009.36.
  • 4T Okamoto.Authenticated key exchange and key encapsulation in the standard model[A].Advances in Cryptology,Asiacrypt 2007[C].Berlin:Springe-Verlag,2007.474-484.
  • 5M Kim,A Fujioka,B Ustaolu.Strongly secure authenticated key exchange without NAXOS' approach[A].Proceedings of 4th International Workshop on Security (IWSEC' 09)[C].Berlin:Springe-Verlag,2009.174-191.
  • 6K Yoneyama.Efficient and strongly secure password-based server aided key exchange[A].Proceedings of 9th International Conference on Cryptology in India(Indocrypt'08)[C].Berlin:Springe-Verlag,2010.172-184.
  • 7J Zhao,D Gu.Provably secure three-party password-based authenticated key exchange ptotocol[J].Information Sciences,2012,184(1):310-323,2012.
  • 8J Nam,J Paik,D Won.Security analysis of Zhao and Gu's key exchange protocol[EB/OL].http://oniinepresent.org/ proceedings/vo12-2012/15.pdf.
  • 9M Bellare,D Pointcheval,P Rogaway.Authenticated key exchange secure against dictionary attacks[A].Advances in Cryptology,Eurocrypt 2000[C].Berlin:Springe-Verlag,2000.139-155.
  • 10X Li,J Niu,MK Khan,et al.An enhanced smart card based remote user password authentication scheme[J].Journal of Network and Computer Applications,2013,36(5):1365-1371.

共引文献30

同被引文献14

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部