期刊文献+

对HEMA模型的注记

A Note on HEMA
在线阅读 下载PDF
导出
摘要 首先通过分析HEMA模型 ,发现其中的若干设计缺陷 ,指出该模型存在的若干冗余 ,还分析讨论该协议中存储并加密传输密钥协商因子设计的不合理性 .然后讨论一个该协议并发运行的实例 ,从而指出该协议可能存在的并发运行错误 ,进一步说明使用可信第三方存储并加密传输可以完全公开的密钥协商因子是个实质性的错误 .最后 ,将HEMA模型与现有的若干认证与密钥交换协议进行比较 ,讨论HEMA的运行效率 . In a recent paper, a hybrid encryption model for authentication(HEMA) was proposed, and the authors declare that HEMA encompasses all the virtues of typical models of authentication and is able to be applied in many sorts of open network systems such as mobile agents and multi-agents systems. In this paper, we point out some defects of HEMA. We show there are some redundancies and concurrent run-time errors in the protocol and indicate that to store and transfer the public key, which is desired to be transferred in open channels, by the trusted party secretly is a substantial error. Furthermore, we discuss the efficiency of the protocol by comparing it with some relative protocols.
出处 《计算机学报》 EI CSCD 北大核心 2004年第4期573-576,共4页 Chinese Journal of Computers
基金 国家自然科学基金 ( 90 10 40 0 5 60 173 0 3 2 60 2 73 0 49)资助
关键词 认证 密钥交换 安全协议 HEMA模型 混合密码认证模型 authentication key distribution cryptographic protocol
  • 相关文献

参考文献5

  • 1王汝传,王绍棣,孙知信,傅静.混合密码认证模型的研究[J].计算机学报,2002,25(11):1144-1148. 被引量:11
  • 2Diffie W., Hellman M.E..New directions in cryptography. IEEE Transactions on Information Theory,1976,22(6):644~654
  • 3Burrows M., Abadi M., Needham R.. A logic of authentication.Digital Systems Research Center,Technical Report 39,1989
  • 4Schneier B.. Applied Cryptography: Protocols, Algorithms, and Source Code in C. second edition. New York: John Wiley & Sons, 1996
  • 5Boyko V., MacKenzie P., Patel S.. Provably secure password-authenticated key exchange using Diffie-Hellman. In: Proceedings of EUROCRYPT 2000, Berlin Heidelberg, volume 1807 of LNCS. 2000, 156~171

二级参考文献1

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部