期刊文献+

一个新的基于口令的密钥协商协议 被引量:4

New key agreement protocol based on passwords
在线阅读 下载PDF
导出
摘要 以不经意多项式计算作为核心组件,提出了一个基于口令的密钥协商协议PSKA-I,该协议能够抵抗字典攻击但只能工作于认证模型。为解决协议PSKA-I这一缺陷,根据BCK安全模型设计了消息传输认证器,将协议PSKA-I转换为非认证模型中的安全协议PSKA-Ⅱ。上述协议口令的安全性由不经意多项式计算予以保证。与GL协议相比,该协议的通信及计算复杂度明显降低。 This paper proposed a password based key agreement protocol PSKA-I in authenticated model,which employed oblivious polynomial evaluation and was secure against dictionary attack. In order to resist active attack,designed a message transmission authenticator according to BCK security model which was used to transfer the protocol PSKA-I to protocol PSKAⅡ in unauthenticated model. The security of password in these two protocols was guaranteed by oblivious polynomial evaluation. Compared to protocol GL,the complexity of communication and computation of the protocols proposed was lower.
出处 《计算机应用研究》 CSCD 北大核心 2010年第10期3885-3888,共4页 Application Research of Computers
关键词 基于口令的密钥协商协议 不经意多项式计算 字典攻击 BCK安全模型 消息认证器 key agreement protocol based on passwords oblivious polynomial evaluation dictionary attack BCK security model message transmission authenticator
  • 相关文献

参考文献13

  • 1BELLOVIN S M, MERRITT M. Encrypted key exchange:passwordbased protocols secure against dictionary attacks [ C]//Proc of IEEE Computer Society Symposium on Research in Security and Privacy. Oakland:IEEE Computer Society, 1992:72- 84.
  • 2BELLOVIN S M, MERRITT M. Augmented encrypted key exchange : a password-based protocol secure against dictionary attacks and password file compromise[ C]//Proc of ACM Conference on Computer and Communications Security. New York: ACM Press, 1993:244- 250.
  • 3JABLON D P. Extended password key exchange protocols immune to dictionary attacks [ C ]//Proc of WETICE' 97 Workshop on Enterprise Security. Cambridge: IEEE Computer Society, 1997:248- 255.
  • 4BELLARE M, ROGAWAY P. Entity authentication and key distribution[C]//Advances in Cryptology- CRYPTO' 93. Berlin: Springer- Verlag, 1993:232- 249.
  • 5BELLARE M, POINTCHEVAL D, ROGAWAY P. Authenticated key exchange secure against dictionary attacks[ C ]//Advances in Cryptology-EUROCRYPT 2000. Berlin: Springer-Verlag, 2000:139- 155.
  • 6BOYKO V, MACKENZIE PD, PATEL S. Provably secure passwordauthenticated key exchange using Diffie-Hellman [ C ]//Advances in Cryptology-EUROCRYPT 2000. Berlin: Springer-Verlag, 2000 : 156- 171.
  • 7GOLDREICH O, LINDELL Y. Session-key generation using humman passwords only [ C ]//Proc of CRYPTO' 01. [ S. l. ] : Springer-Verlag, 2001 : 408-432.
  • 8HALEVI S, KRAWCZYK H. Public-key cryptography and password protocols [J]. ACM Trans on Information and System Security, 1999,2(3) :230-268.
  • 9BELLARE M, CANETTI R, KRAWCZYK H. A modular approach to the design and analysis of authentication and key exchange protocols [ C]//Proc of the 30th Annual Symposium on the Theory of Computing. New York: ACM Press, 1998:419- 428.
  • 10NAOR M, PINKAS B. Oblivious transfer and polynomial evaluation [ C]//Proc of the 32nd ACM Symposium on the Theory of Computing. 1999 : 245- 254.

同被引文献22

  • 1吴世忠,祝世雄,张文政.应用密码学[M].北京:机械工业出版社,2007.
  • 2MENEZES A, ORSCHOT P, VANSTONE S. Handbook of applied cryptography [ M ]. New York: CRC Press, 1996: 425-460.
  • 3BOYD C, PARK D G. Public key protocols for wireless communications[ C ] // Proceedings of the ICISC 1998. Seonl: KIISC, 1998 : 47-57.
  • 4SHOUP V. On formal models for secure key exchange [EB/OL]. [2011-05-15]. http: // www. shoup, net/ paper/skey, ps.
  • 5VIET D Q, YAMAMURA A, password-based authenticated Proceedings of INDOCRYPT. 2005 ; 244-257. TANAKA H. Anonymous key exchange [ C ] // Berlin : Springer-Verlag,.
  • 6CHAI Z C, CAO Z F, LU R X. Efficient password-based authentication and key exchange scheme preserving user privacy[ C ]//WASA 2006. Heidelberg: Springer-Verlag, 2006 : 467-477.
  • 7CHOW S S M, CHOO K K R. Strongly-secure identity- based key agreement and anonymous extension [ C I JJ Proceedings of Information Security Conference ( ISC2007 ). Berlin : Springer-Verlag, 2007 : 203-220.
  • 8胡晓婷,覃中平,张红,郝国生.OpenSSL中AES算法的研究与优化[J].微计算机信息,2009,25(12):83-85. 被引量:11
  • 9曹雪菲,寇卫东,樊凯,张军.无双线性对的基于身份的认证密钥协商协议[J].电子与信息学报,2009,31(5):1241-1244. 被引量:17
  • 10胡焰智,马大玮,田增山.一种匿名认证密钥协商协议[J].计算机应用研究,2009,26(8):3024-3027. 被引量:1

引证文献4

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部