期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
TUP: A New eCK-Secure AKE Protocol under the CDH Assumption
1
作者 Qinglei Zhou zengfu yang 《International Journal of Communications, Network and System Sciences》 2012年第6期332-336,共5页
The design and analysis of authenticated key exchange protocol is an important problem in information security area. At present, extended Canetti-Krawczyk (eCK) model provides the strongest definition of security for ... The design and analysis of authenticated key exchange protocol is an important problem in information security area. At present, extended Canetti-Krawczyk (eCK) model provides the strongest definition of security for two party key agreement protocol, however most of the current secure protocols can not be prove to secure without Gap assumption. To avoid this phenomenon, by using twinning key technology we propose a new two party key agreement protocol TUP which is obtained by modifying the UP protocol, then in conjunction with the trapdoor test, we prove strictly that the new protocol is secure in eCK model. Compared with previous protocols, the security assumption of new proposal is more standard and weaker, and it also solves an open problem in ProvSec'09. 展开更多
关键词 Authenticated Key Exchange Provable Security eCK Model Computational DIFFIE-HELLMAN ASSUMPTION TRAPDOOR Test
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部