期刊文献+

一种基于口令的多方密钥协商协议 被引量:1

A Sort of N-Party Authenticated Key Agreement Protocol Based on Password
在线阅读 下载PDF
导出
摘要 针对日益增长的组通信的需要,提出一种基于口令的组通信密钥协商协议(PAGKA)。该协议以口令为切入点,并在一个可信服务器的帮助下抵抗离线字典攻击,验证参与方的诚实性;然后服务器帮助参与各方协商密钥,在服务器没有得到密钥的情况下,将密钥有关信息发送给组成员;组成员按照得到的信息和本身拥有的秘密计算出会话密钥;当组成员变化时,服务器帮助动态增加或删除组成员,实现前向与后向安全。通过与GDH和N-party-PAKE方案进行安全与性能的对比,PAGKA在性能,安全性与实用性方面都具有明显优势。 Taking aim at the growing need of group communication, a password authenticated group key agreement protocol (PAGKA) based on password was put forward. The PAGKA flow is as follows. Based on different password and with a trusted server help, PAGKA can withstand off-line dictionary attack and validate each other. Under the condition that the server can't get the session key during all the protocol process it transfers the related information to clients. According to the information transferred by the server, all clients can compute the session key individually by the owned secret. PAGKA can achieve random group members' addition or delete based on forward security and backward security. The comparison of the security and the performance among GDH, N-party-PAKE and PAGKA shows that PAGKA has distinct superiority.
出处 《兵工学报》 EI CAS CSCD 北大核心 2008年第2期148-152,共5页 Acta Armamentarii
基金 辽宁省自然基金(20042042) 辽宁省教育科学基金(05L420)
关键词 通信技术 开端协议 密钥协商 组认证 字典攻击 communication open-ended protocol key agreement group authenticated dictionary attack
  • 相关文献

参考文献11

  • 1Bellare M, Pointcheval D, Rogaway P. Authenticated key exchange secure against dictionary attacks [ C ]. In proceedings of Eurocrypt'00, LNCS Vol.1807. Springer-Verlag, 2000: 139- 155.
  • 2Bellovin S, Merrit M. Encrypted key exchange: password based protocols secure against dictionary attacks [ C]. In proceedings of the Symposium on Security and Privacy. IEEE, 1992: 72- 84.
  • 3Bresson E, Chevassut O, Pointcheval D. Group diffie-hellman key exchange secure against dictionary attacks[C]. In proceedings of Asiacrypt'02, LNCS Vol. 2501, Sprlnger-Verlag, 2002:497 -514.
  • 4Abdalla M, Fouque P, Pointcheval D. Password-based authenticated key exchange in the three-party setting[ C]. In proceedings of PKC'05, LNCS Vol. 3386. Springer-Verlag, 2005:65 - 84.
  • 5Byun J, Jeong I, Lee D, et al. Password-authenticated key exchange between clients with different passwords[C]. In proceedings of ICICS'02, LNCS Vol. 2513. Springer-Verlag, 2002: 134 - 146.
  • 6Lin C, Sun H, Steiner M, et al. Three-party encrypted key exchange without server public-keys[J ]. In IEEE Communications Letters, 2001, 29(3): 497-499.
  • 7Steiner M, Tsudik G, Waider M. Refinement and extension of encrypted key exchange [ J ]. In ACM Operation Sys Review, 1995, 29(3): 22- 30.
  • 8Byun Jin Wook, Lee Dong Hoon. N-party encrypted diffie-hellman key exchange using different passwords[C]. ACNS 2005, LNCS 3531, Springer-Verlag: Berlin Heidelberg, 2005: 75- 90.
  • 9Tang Q, Chen L. Weaknesses in two group Diffie-Hellman key exchange protocols. [2006 - 10 - 10]. http://eprint, iacr. org/ 2005/197. pdf.
  • 10Ran Canetti. Universally composable secrity: a new paradigm for crptographic protocols. [ 2006 - 10 - 10 ]. http: //people. csail, mit. edu/canetti/2005.

同被引文献1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部