期刊文献+

基于ECDSA的三方口令认证密钥交换协议 被引量:3

ECDSA-based Password Authenticated Key Exchange Protocol for Three-party
在线阅读 下载PDF
导出
摘要 提出一种基于椭圆曲线数字签名算法(ECDSA)的三方口令认证密钥交换协议。将ECDSA分为公钥生成、签名过程和验证过程3个阶段,在此基础上,设计协议过程、双向认证机制,使任意2个用户通过服务器能进行身份认证和密钥交换。分析结果表明,该协议能降低计算难度和存储开销,抵抗字典攻击和服务器泄露攻击。 In order to against dictionary attack and server compromise attack, this paper proposes a Elliptic Curve Digital Signature Algorithm(ECDSA)-based password authenticated key exchange protocol for three-party. ECDSA is divided into public key generation, signature verification process and verification process. On the bases of it, this protocol is divided into six steps, and designs mutual authentication mechanism. And any two clients can accomplish key exchange relying on the server. Analysis results show that this protocol can reduce the calculation difficulty and storage cost, and can resist dictionary attacks and server compromise attack.
出处 《计算机工程》 CAS CSCD 2012年第6期153-155,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60773013)
关键词 口令认证密钥交换 字典攻击 椭圆曲线数字签名算法 重放攻击 Password Authenticated Key Exchange(PAKE) dictionary attack Elliptic Curve Digital Signature Algorithm(ECDSA) replay attack
  • 相关文献

参考文献8

  • 1王天芹.基于口令的认证密钥交换协议[J].计算机工程,2008,34(14):4-6. 被引量:3
  • 2柯芳芳,唐西林,章启恒.对一个口令认证协议的可攻击性分析及改进[J].计算机工程,2010,36(7):142-143. 被引量:3
  • 3Michael S, Gene T, Michael W. Refinement and Extension of Encrypted Key Exchange[J]. ACM Operation System Review, 1995, 29(3): 22-33.
  • 4Lin Chunli, Sun Hongmin, Steiner M, et al. Three-party Encrypted Key Exchange Without Server Public-key[J]. IEEE Communi- cations Letters, 2001, 5(12): 497-499.
  • 5Bederson JB,Pitts LH,Tsuji M, et al. Rat middle Cerebral artery occlusion: evaluation of the mode and developxent of a neurologic examination. Stroke, 1986,17:472 - 476
  • 6Ch PH. Role of oxidants in ischemia brain damage. Stroke,1996,27:1124 - 1129
  • 7Lu Rongxing, Cao Zhenfu. Simple Three-party Key Exchange Protocol[J]. Computer and Security, 2007, 26(1): 94-97.
  • 8胡学先,刘文芬.对两个三方口令认证密钥交换协议的分析[J].信息工程大学学报,2010,11(1):104-107. 被引量:5

二级参考文献21

  • 1Elgamal T. A Public Key Cryptosystems and a Signature Schemes Based on Discrete Logarithms[J]. IEEE Transactions on Information Theory, 1985, 31(4): 469-472.
  • 2Shamir A. Dentity-based Cryptosystems and Signature Schemes[C]// Proc. of CRYPTO'84. Berlin, Germany: [s. n.], 1984.
  • 3Chan J F. Smart Card-based Security Password Authentication Scheme[J]. Computers and Security, 1996, 15(3): 131-137.
  • 4Rhee H S, Jeong O K, Dong H, et al. A Remote User Authention Scheme Without Using Smart Cards[J]. Computer Standards & Interfaces, 2009, 31 ( 1 ): 6-13.
  • 5Lu R X,Cao Z F.Simple three-party key exchange protocol[J].Computer Security,2007,26(1):94-97.
  • 6Ahdalla M,Pointcheval D.Simple password-based encrypted key exchange protocols[C]//Proc.CT-RSA.2005:191-208.
  • 7Chung H R,Ku W C.Three weaknesses in a simple throe-party key exchange protocol[J].Information Science,2008,178(1):220-229.
  • 8Kim H S,Choi J Y.Enhanced Password-based simple three-party key exchange protocol[J].Comput Electr Eng,2009,35(1):107-114.
  • 9Phan R C W,Goi B M.Cryptanalysis of simple three-party key exchange protocol[J].Information Science,2008,178(8):2849-2856.
  • 10Boyd C,Mathuria A.Protocols for authentication and key establishment[M].Berlin:Springer-Verlag Press,2003:247-266.

共引文献9

同被引文献30

  • 1Lindner R and Peikert C. Better key sizes (and attacks) for LWE-based encryption[C]. CT-RSA 2011, San Francisco, CA, USA, February 14-18, 2011, LNCS 6558: 319-339.
  • 2Micciancio D and Peikert C. Trapdoors for lattices: simpler, tighter, faster, smaller[C]. EUROCRYPT 2012, Cambridge, UK, April 15-19, 2012, LNCS 7237: 700-718.
  • 3Boyen X. Lattice mixing and vanishing trapdoors: a framework for fully secure short signatures and more[C].PKC 2010, Paris, France, May 26-28, 2010, LNCS 6056: 499-517.
  • 4Lyubashevsky V. Lattice signatures without trapdoors[C]. EUROCRYPT 2012, Cambridge, UK, April 15-19 2012, LNCS 7237: 738-755.
  • 5Katz J and Vaikuntanathan V. Smooth projective hashing and password-based authenticated key exchange from Lattices[C]. ASIACRYPT 2009, Tokyo, Japan, December 6-10, 2009, LNCS 5912: 636-652.
  • 6Hu Xue-xian. Analysis and design of password authenticated key exchange protocols in the standard model[D]. [Ph.D. dissertation], PLA Information Engineering University, 2010.
  • 7Abdalla M, Fouque P, and Pointcheval D. Password-based authenticated key exchange in the three-party setting[C]. PKC 2005, Les Diablerets, Switzerland, January 23-26, 2005, LNCS 3386: 65-84.
  • 8Gennaro R and Lindell Y. A framework for password-based authenticated key exchange[J]. ACM Transactions on Information and System Security, 2006, 9(2): 181-234.
  • 9Groce A and Katz J. A new framework for efficient password- based authenticated key exchange[C]. CCS 2010, Chicago, Illinois, USA, October 4-8, 2010: 516-525.
  • 10Bellare M, Pointcheval D, and Rogaway P. Authenticated key exchange secure against dictionary attacks[C]. EUROCRYPT 2000, Bruges, Belgium, May 14-18, 2000, LNCS 1807: 139-155.

引证文献3

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部