期刊文献+

标准模型下高效的基于口令认证密钥协商协议 被引量:9

Efficient Password-Based Authenticated Key Exchange Protocol under Standard Model
下载PDF
导出
摘要 基于口令的认证密钥协商协议是利用预先共享的口令协商安全性较高的密钥。现有的基于口令认证密钥协商协议大多需要较大的计算量,或者只在随机预言模型下证明了协议的安全性。该文提出了新的标准模型下基于口令密钥协商协议,协议只需要一个生成元。与其它标准模型下的协议相比,新协议不需要CPA或CCA2安全的加密方案,因而具有计算复杂度低和协议描述简单的特点。相对于殷胤等人在"标准模型下可证安全的加密密钥协商协议"一文中提出的协议,新协议将指数运算降低了64%。最后,基于DDH假设,在标准模型下证明了协议的安全性。 The goal of password-based authenticated exchange protocol is established secure key by using preshared human-memorable password.Most of existing schemes either have computation burden or rely on the random oracle model.A new scheme without random oracles is proposed,which requires only one generator.Due to not using CPA or CCA2 public encryption scheme,the proposed protocol is efficient in computational cost and simple in protocol description when compared other solutions without random oracles.Specifically,this protocol reduces 64% of the exponential computations of the protocol proposed by Yin Yin et al.in the paper of "Provable secure encrypted key exchange protocol under standard model".The security of the proposed scheme has been proven in the standard model under DDH assumption.
作者 舒剑 许春香
出处 《电子与信息学报》 EI CSCD 北大核心 2009年第11期2716-2719,共4页 Journal of Electronics & Information Technology
基金 国家"863"计划项目(2009AA012415)资助课题
关键词 身份认证 基于口令 标准模型 可证安全 Authentication Password-based Standard model Provably secure
  • 相关文献

参考文献9

  • 1Bellovin S and Merritt M. Encrypted key exchange: password-based protocol secure against dictionary attacks[C]. Proceedings of the 1992 Conference IEEE computer society symp. on Research in security and privacy, Oakland, USA, 1992: 72-84.
  • 2Bellare M, Pointcheval D, and Rogaway P. Authenticated key exchange secure against dictionary attacks[C]. Proceedings of EUROCRYPT 2000, Bruges, Belgium, LNCS 1807: 139-155.
  • 3Abdalla M, Chevassut O, and Pointcheval D. One-time verifier-based encrypted key exchange[C]. Proceedings of PKC 2005, Les Diablerets, Switzerland, LNCS 3386: 47-64.
  • 4Abdalla M and Pointcheval D, Simple password-based encrypted key exchange protocols[C]. Proceedings of CT-RSA 2005, San Francisco, USA, LNCS 3376: 191-208.
  • 5Shao Jun, Cao Zhen fu, and Wang Li cheng. Efficient password-based authenticated key exchange without Public information[C]. Proceedings of ESORICS 2007, Dresden, Germany, LNCS 4734: 299-310.
  • 6FENG DengGuo CHEN WeiDong.Modular approach to the design and analysis of password-based security protocols[J].Science in China(Series F),2007,50(3):381-398. 被引量:4
  • 7Katz J, Ostrovsky R, and Yung M. Efficient password-authentication key exchange using human- memorable passwords[C]. Proceedings of EUROCRYPT 2001 Innsbruck, Austria, LNCS 2045: 475-494.
  • 8Jiang S Q and Gong G. Password based key exchange with mutual authentication[C]. Proceedings of SAC 2004, Nicosia, Cyprus, LNCS 3357: 267-279.
  • 9殷胤,李宝.标准模型下可证安全的加密密钥协商协议[J].软件学报,2007,18(2):422-429. 被引量:9

二级参考文献19

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 2Bellovin SM,Merritt M.Encrypted key exchange:Password-Based protocols secure against dictionary attacks.In:Proc.of the 1992 IEEE Computer Society Symp.on Research in Security and Privacy.Oakland:IEEE Computer Society,1992.72-84.
  • 3Bellovin SM,Merritt M.Augmented encrypted key exchange:A password-based protocol secure against dictionary attacks and password file compromise.In:Denning D,ed.ACM Conf.on Computer and Communications Security.New York:ACM Press,1993.244-250.
  • 4Jablon DP.Extended password key exchange protocols immune to dictionary attacks.In:Proc.of the WETICE'97 Workshop on Enterprise Security.Cambridge:IEEE Computer Society,1997.248-255.
  • 5Steiner M,Buhler P,Eirich T,Waidner M.Secure password-based cipher suite for TLS.ACM Trans.on Information and System Security,2001,4(2):134-157.
  • 6Wu TD.The secure remote password protocol.In:Proc.of the Network and Distributed System Security Symp.NDSS 1998.San Diego:Internet Society,1998.
  • 7Bellare M,Pointcheval D,Rogaway P.Authenticated key exchange secure against dictionary attacks.In:Preneel B,ed.Advances in Cryptology-EUROCRYPT 2000.LNCS 1807,Berlin:Springer-Verlag,2000.139-155.
  • 8Bellare M,Rogaway P.Entity authentication and key distribution.In:Stinson DR,ed.Advances in Cryptology-CRYPTO'93.LNCS 773,Berlin:Springer-Verlag,1993.232-249.
  • 9Boyko V,MacKenzie PD,Patel S.Provably secure password-authenticated key exchange using diffie-hellman.In:Preneel B,ed.Advances in Cryptology-EUROCRYPT 2000.LNCS 1807,Berlin:Springer-Verlag,2000.156-171.
  • 10Abdalla M,Chevassut O,Pointcheval D.One-Time verifier-based encrypted key exchange.In:Vaudenay S,ed.Public Key Cryptography-PKC 2005.LNCS 3386,Berlin:Springer-Verlag,2005.47-64.

共引文献10

同被引文献44

  • 1唐权华,金炜东.成长性身份认证[J].网络安全技术与应用,2004(12):27-29. 被引量:2
  • 2殷胤,李宝.标准模型下可证安全的加密密钥协商协议[J].软件学报,2007,18(2):422-429. 被引量:9
  • 3Boyd C,Mathuria A.Protocols for authentication and key establishment[M].Berlin : Springer-Verlag, 2003 : 247-266.
  • 4Bellovin S M,Merritt M.Enerypted key exchange:Password based protocol secure against dictionary attack[C']//IEEE Symposium on Research in Security and Privacy, Oakland, 1992: 72-84.
  • 5Bellare M,Pointcheval D, Rogaway P.Authenticated key exchange secure against dictionary attacks[C]//LNCS 1807:Eurocrypt 2000. Berlin : Springer-Verlag, 2000:139-155.
  • 6MacKenzie P.The PAK suite:Protocols far password authenficated key exchange,Technical Report 2002-46[R/OL].DIMACS,2002-10. http://dimacs.rutgers.edu/Technic alReport s/abstract/2002/2002--46.html.
  • 7Katz J,Vaikuntanathan V.Smooth projective hashing and password- based authenticated key exchange from lattices[C]//LNCS 5912:Asiacrypt 2009,2009 : 636-652.
  • 8Canetti R,Goldreich O,Halevi S.The random oracle methodology, revisited[C]//The 30th Annual ACM Symposium on Theory of Computing, 1998 : 209-218.
  • 9Goldreich O,Lindell Y.Session key generation using human passwords only[C]//LNCS 2139:Crypto 2001.Berlin:Springer-Verlag,2001: 408-432.
  • 10Katz J,Ostrovsky R,Yung M.Practical password-authenticated key exchange provably secure under standard assumptions[C]//LNCS 2045: Eurocrypt 2001.Berlin:Springer-Verlag,2001:475-494.

引证文献9

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部