期刊文献+

具有强匿名性的网关口令认证密钥交换协议

An Efficient Gateway-Oriented Password-Based Authenticated Key Exchange Protocol with Strong User Anonymity
在线阅读 下载PDF
导出
摘要 网关口令认证密钥交换协议允许用户和网关在服务器的协助下建立起一个共享的会话密钥,其中用户和服务器之间的认证通过低熵的口令来完成.已有的网关口令认证密钥交换协议对用户的匿名性研究不足.该文基于Diffie-Hellman密钥交换提出了具有强匿名性的网关口令认证密钥交换协议,并且在随机预言模型下基于标准的DDH假设证明了协议的安全性.新协议可以抵抗不可检测在线字典攻击并且计算效率高,安全性和计算效率都优于已有的同类协议. Gateway-oriented password-based authenticated key exchange (GPAKE) protocol al- lows a client and a gateway to establish a common session key with the help of an authentication server, where the authentication between the client and the server is done via a low-entropy pass- word. The approach of designing GPAKE protocols with user anonymity is far from maturity and perfection. This paper presents a GPAKE protocol with strong user anonymity based on the Dif- fie-Hellman key exchange, and then proves its security under the standard DDH assumption in the random oracle model. The new protocol can resist the undetectable on-line dictionary attack and is quite efficient in terms of computation. Compared with other related protocols, the new protocol is more secure and efficient.
出处 《计算机学报》 EI CSCD 北大核心 2012年第9期1823-1832,共10页 Chinese Journal of Computers
关键词 口令认证 网关 匿名性 随机预言模型 DDH假设 password authentication gateway anonymity random oracle model: DDH assumption
  • 相关文献

参考文献14

  • 1Abdalla M, Chevassut O, Fouque P A, Pointcheval D. A simple threshold authenticated key exchange from short secrets//Proceedings of the Advances in Cryptology- Asiacrypt 2005. Chennai, India, 2005. LNCS 3788. Berlin: Springer-Verlag, 2005:566-584.
  • 2Byun J W, Lee D H, Lim J I. Security analysis and improve- ment of a gateway-oriented password based authenticated key exchange protocol. IEEE Communications Letters, 2006, 10(9) : 683-685.
  • 3Ding Yun, Horster P. Undetectable on-line dictionary attacks. ACM Operating System, 1995, 29(3): 77-86.
  • 4Shim K A, Cryptanalysis ant/enhancement of modified gate- way-oriented password-based authenticated key exchange protocol. IEICE Transactions on Fundamentals, 2008, E91 A(12) :3837-3839.
  • 5Abdalla M, Izabachene M, Pointcheval D. Anonymous and transparent gateway based password authenticated key ex change//Proceedings of the 7th International Conference on Cryptology and Network Security, Hong Kong, China, 2008. LNCS5339. Berlin: Springer-Verlag, 2008:133-148.
  • 6Chor B, Goldreich O, Knshilevitz E, Sudan M. Private in- formation retrieval. Journal of ACM, 1998, 45(6): 965-981.
  • 7Gertner Y, Ishai Y, Kushilevitz E, Malkin T. Protecting da ta privacy in private information retrieval schemes/ /Proceed- ings of the 30th Annual ACM Symposium on Theory of Com puting (STOC), ACM Press, 1998:151-160.
  • 8Yoon E J, Yoo K Y. An optimized gateway oriented pass- word-based authenticated key exchange protocol. IEICE Transactions on Fundamentals, 2010, E93-A(4):850-853.
  • 9魏福山,马传贵,程庆丰.基于RSA的网关口令认证密钥交换协议[J].计算机学报,2011,34(1):38-46. 被引量:6
  • 10Wei F S, Ma C G, Cheng Q F Anonymous gateway oriented password authenticated key exchange based on RSA. EUR- ASIP Journal on Wireless Communications and Networking, 2011:162.

二级参考文献16

  • 1Ding Yun, Horster P. Undetectable on-line dictionary attacks. ACM Operating System, 1995, 29:77-86.
  • 2Bellovin S M, Merritt M. Encrypted key exchange: Pass word-based protocols secure against dictionary attacks//Proceedings of the IEEE Symposium on Security and Privacy, Oakland, USA, 1992:72-84.
  • 3Patel S. Number theoretic attacks on secure password schemes//Proceedings of the IEEE Symposium on Security and Privacy. Oakland, USA, 1997:236-247.
  • 4Abdalla M, Chevassut O, Fouque P A, Pointcheval D. A simple threshold authenticated key exchange from short seerets//Advanees in Cryptology-Asiacrypt 2005. Chennai, India. LNCS 3788. Berlin: Springe-Verlag, 2005:566-584.
  • 5Abdalla M, Fouque P A, Pointcheval D. Password-based authenticated key exchange in the three party setting//Proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography. Les Diablerets, Switzerland, 2005, 65-86.
  • 6Abdalla M, Izabachene M, Pointcheval D. Anonymous and transpanent gateway-based password-authenticated key exchange//Proceedings of the 7th International Conference on Cryptology and Network Security. Hong Kong, Berlin: Springer-Verlag, 2008:133-148.
  • 7Abdalla M, Pointcheval D. Interactive Diffie-Hellman assumptions with applications to password based authentication//Proceedings of the 9th International Conference on Financial Cryptography and Data Security. Roseau, The Commonwealth of Dominica. 2005:341-356.
  • 8Byun J W, Lee D H, Lira J I. Security analysis and improvement of a gateway-oriented password-based authenticated key exchange protocol. IEEE Communications Letters, 2006, 10 (9) : 683 -685.
  • 9Bellare M, Pointcheval D, Rogway P. Authenticated key exchange secure against dictionary attacks//Advances in Cryp tology-Eurocrypt 2000. Bruges, Belgium. LNCS1807. Berlin: Springer-Verlag, 2000:139 -155.
  • 10Lucks S. Open key exchange: How to defeat dictionary attacks without encrypting public keys//Proceedings of the 5th International Workshop on Security Protocols 1997. Paris, France. 1997:79-90.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部