期刊文献+

基于口令的可隐含认证的密钥协商协议 被引量:4

Implicitly Authenticated Key Agreement Protocol Based on Password
下载PDF
导出
摘要 研究了群组通信中的密钥协商协议,首先用可变的底数来代替DH方案中的固定底数,改进了两方(Two-party)密钥协商协议PPK[5],然后把两方协议扩展成多方(Multi-party)协议,并且分析了所提出的两个协议对被动攻击和主动攻击的抵抗能力,最后给出了前者在抵抗联合攻击方面的不足。 Key agreement protocols used in group communication applications are studied. Firstly, the fixed base used in DH schemes is replaced with a changeable base, by which the two-party key agreement protocol PPK[5] is improved. Secondly, the two-party protocol is extended to a multi-party protocol. The security of the two protocols against passive attacks and active attacks is discussed. However, the multi-party protocol can not fight against collusive attacks.
出处 《计算机工程》 CAS CSCD 北大核心 2002年第11期32-33,119,共3页 Computer Engineering
关键词 口令 可隐含认证 密钥协商协议 网络安全 计算机网络 Password;Implicit authentication;Key agreement protocol; PFS
  • 相关文献

参考文献7

  • 1Jablon D P. Strong Password-only Authenticated Key Exchange. ftp://ftp, std.com/pub/dpj/out/spekeps.zip, 1996-09-25
  • 2Burmester M, Desmedt Y. A Secure and Efficient Conference Key Distribution System. Advances in Cryptology: Proceedings of Eurocrypt'94, Springer-Verlag, 1995:275-286
  • 3Diffie W, Hellman M. New Directions in Cryptography. IEEE Transactions on Information Theory, IT-22(6), 1976-11:644-654
  • 4Just M, Vaudenay S. Authenticated Multi-party Key Agreement. Advances in Cryptology - Asiacrypt'96, Springer-Verlag, 1996:36-49
  • 5Boyko V, MacKenzie P, Patel S.Provablysecure Password Authenticated Key Exchange Using Diffie-Hellman. In B. Preneel, editor, Proceedings of Advances in Cryptology - EUurocrypt 2000, Volume 1807of Lecture Notes in Computer Science, Binges, Belgium, SpringerVerlag, 2000-05
  • 6Ateniese G, Steiner M, Tsudik G. New Multipaty Authentication Services and Key Agreement Protocols. IEEE Journal of Selected Areas in Communications, 2000,18(4)
  • 7Anderson R, Vaudenay S. Minding Your p's and q's. In Advances in Cryptology: Proceeding of Asiacrypt'96. Springer-Verlag, Berlin Germany, 1996

同被引文献14

  • 1王勇,李明,曹元大.基于B-树的分布式群组密钥管理机制[J].计算机工程,2004,30(20):3-4. 被引量:2
  • 2LiGong.Java 2平台安全技术[M].北京:机械工业出版社,2000..
  • 3Amir Y.,Nita-Rotaru C.and Stanton J.,Framework for authentication and access control of client-server group communication systems,Tech.Rep.CNDS2001-2,Johns Hopkins University,Center of Networking and Distributed Systems,2001.http:∥www.cnds.jhu.edu/publications/.
  • 4Giuseppe Ateniese,Secure and Efficient Group Communication in Wide and Local Area Networks:[dissertation].Italy:Univ.of di Genova,1999.
  • 5J.Kong,H.Luo,K.Xu,D.L.Gu,M.Gerla,and S.Lu,Adaptive Security for Multi-level Ad-hoc Networks.In Journal of Wireless Communications and Mobile Computing (WCMC),volume2,pp.533~547,2002.
  • 6王勇 曹元大.一种基于Tate Pairings的群组密钥管理机制[A]..《第十二届网络与数据通信学术会议》[C].武汉,2002年12月..
  • 7G Atenlese.Secure and Efficient Group Communication in Wide and Local Area Networks[D].Italy:Univ of di Genova, 1999.
  • 8Openssl Project team.OpenSSL 0.9.61[EB/OL].http://www.openssLorg/, 2003-11-04/2004-8-5.
  • 9王勇 曹元大.一种基于Tate Pairings的群密钥管理机制[C]..见:第十二届网络与数据通信学术会议论文集[C].武汉,华中师范大学出版社,2002.105-107.
  • 10LI Ming,WANG Yong,GU Da-wu et al.Authenticated Group Key Agreement from the Tate Pairings[C].In:Proceedings of the International Workshop on Grid and Cooperative Computing,Beijing:Publishing House of Electronics Industry,2002:954-963.

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部