期刊文献+

理想格上基于验证元的三方口令认证密钥交换协议 被引量:3

Verifier-Based Three-Party Password-Authenticated Key Exchange Protocol from Ideal Lattices
下载PDF
导出
摘要 现有基于格的3PAKE协议皆属于对称协议,即用户口令被以明文或哈希值的形式存储在服务器上,这使得协议易遭受服务器泄露攻击.而基于验证元的格基3PAKE协议则可以抵抗这类攻击.因此,首先在通用可组合框架下,基于Gentry等人提出的非对称口令认证密钥交换理想功能,定义了基于验证元的3PAKE理想功能.然后,基于Gao等人于2017年所提出的理想格上基于验证元的两方口令认证密钥交换协议,并同时借鉴Abdalla等人关于构造通用可组合安全协议的设计思想,构造出一个理想格上基于验证元的3PAKE协议.接着,证明新协议可以安全地实现基于验证元的3PAKE理想功能.最后,通过与相关协议进行比较,表明新协议在提高了安全性的情况下,仍与它们具有相当的计算与通信效率. Currently,all the existing lattice-based 3PAKE protocols are symmetric,i.e.,in such a protocol the user’s password is stored in the form of plaintext or hash value on the server,which makes the protocol vulnerable to server leakage attacks.Oppositely,a verifier-based lattice-based 3PAKE protocol can resist this kind of attacks.Based on Gentry et al.’s ideal function of asymmetric password authenticated key exchange,we first define the ideal function of 3PAKE based on verifier.Then,combining the idea of the verifier-based two-party password authenticated key exchange protocol of Gao et al.we propose a verifier-based 3PAKE protocol using ideal lattices.We prove that our new protocol realizes the ideal function of 3PAKE based on verifier.Finally,by comparing with the related protocols,it is shown that the protocol has comparable computing and communication efficiency while on the other hand enjoys a better security level.
作者 舒琴 王圣宝 胡斌 韩立东 SHU Qin;WANG Sheng-Bao;HU Bin;HAN Li-Dong(School of Information Science and Engineering,Hangzhou Normal University,Hangzhou 311121,China)
出处 《密码学报》 CSCD 2021年第2期294-306,共13页 Journal of Cryptologic Research
基金 国家重点研发计划(2017YFB0802000) 国家自然科学基金青年科学基金(61702152,61702153)。
关键词 三方密钥交换 口令认证 理想格 通用可组合性 服务器泄露攻击 three-party key exchange password authentication ideal lattice universally composability server compromise attacks
  • 相关文献

参考文献4

二级参考文献29

  • 1BELLARE M, ROGAWAY E Provably secure session key distribution-the three party case[A]. Proceedings of the 27th ACM Symposium on Theory of Computing[C]. Las Vegas: ACM, 1995.57-66.
  • 2CHANG C C, CHANG Y E A novel three-party encrypted key exchange protocol[J]. Computer Standards and Interfaces, 2004, 26(5): 471-476.
  • 3SUN H M, CHEN B C, HWANG T. Secure key agreement protocols for three-party against guessing attacks[J]. Journal of Systems and Software, 2005, 75(1-2): 63-68.
  • 4LEE S W, KIM H S, YOO K Y. Efficient verifier-based key agreement protocol for three parties without server's public key[J]. Applied Mathematics and Computation, 2005, 167(2): 996-1003.
  • 5ABDALLA M, CHEVASSUT O, FOUQUE P A, et al. A simple threshold authenticated key exchange from short secrets[A]. Proc. Asiacrypt'05[C]. Chennai, India, 2005. 566-584.
  • 6KWON J O, JEONG I R, SAKURAI K, et al. Efficient verifier-based password-authenticated key exchange in the three-party setting[J]. Computer Standards and Interfaces, 2007. 513-520.
  • 7LEE S W, KIM H S, YOO K Y. Improvement of Lee and Lee's authenticated key agreement scheme[J]. Applied Mathematics and Computation, 2005, 162(3): 1049-1053.
  • 8KWON J O, HWANG J Y, KIM C W, et al. Cryptanalysis of Lee-Kim-Yoo password- based key agreement scheme[J]. Applied Mathematics and Computation, 2005, 168(2): 858-865.
  • 9HESS F. Efficient identity based signature schemes based on parings[A]. Selected Areas in Cryptography-SAC'02[C]. Springer-Verlag, 2002.310-324.
  • 10BARRETO PSLM, KIM H Y, LYNN B, et al. Efficient algorithms for paring-based cryptosystems[A]. Proceedings of the Crypto'02[C]. Santa Barbara (CA, USA), 2002. 354-369.

共引文献32

同被引文献12

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部