期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A Two-Party Password-Authenticated Key Exchange Protocol with Verifier
1
作者 Shunbo Xiang Bing Xu Ke Chen 《Journal of Computer and Communications》 2021年第4期102-109,共8页
To tackle with the security lack in the password-authenticated key exchange protocol, this paper proposes a two-party password-authenticated key exchange protocol based on a verifier. In the proposed protocol, a user ... To tackle with the security lack in the password-authenticated key exchange protocol, this paper proposes a two-party password-authenticated key exchange protocol based on a verifier. In the proposed protocol, a user stores his password in plaintext, and the server stores a verifier for the user’s password, using DL difficult problem and DH difficult problem, through the session between user and server to establish a session key. The security discussion result shows that the proposed protocol provides forward secrecy, and can effectively defend against server compromising fake attacks, dictionary attacks and middleman attacks. Protocol efficiency comparisons reveal our protocol is more reasonable. 展开更多
关键词 VERIFIER password-authenticated Key Exchange Fake Attack Dictionary Attack Session Key
下载PDF
nPAKE^+:A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords
2
作者 万志国 邓慧杰 +2 位作者 鲍丰 Bart Preneel 顾明 《Journal of Computer Science & Technology》 SCIE EI CSCD 2009年第1期138-151,共14页
Although two-party password-authenticated key exchange (PAKE) protocols have been intensively studied in recent years, group PAKE protocols have received little attention. In this paper, we propose a tree-based grou... Although two-party password-authenticated key exchange (PAKE) protocols have been intensively studied in recent years, group PAKE protocols have received little attention. In this paper, we propose a tree-based group PAKE protocol - nPAKE^+ protocol under the setting where each party shares an independent password with a trusted server. The nPAKE^+ protocol is a novel combination of the hierarchical key tree structure and the password-based Diffie-Hellman exchange, and hence it achieves substantial gain in computation efficiency. In particular, the computation cost for each client in our protocol is only O(log n). Additionally, the hierarchical feature of nPAKE^+ enables every subgroup to obtain its own subgroup key in the end. We also prove the security of our protocol under the random oracle model and the ideal cipher model. 展开更多
关键词 security protocol password-authenticated key exchange group key agreement
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部