摘要
大部分口令认证密钥交换(PAKE)协议的设计者忽略了长期密钥泄露可能造成的危害.文中发现仅仅依靠口令的安全性设计可以抵抗口令泄露攻击的三方PAKE协议是不可能的,所以文中采取服务器通过公钥实现认证的方法,设计一个可以抵抗口令泄露攻击的强安全性协议,其在随机预示和理想密码模型下基于ECGDH假设具有前向安全的特性.
Most password authenticated key exchange(PAKE)protocol designers ignored the attacks resulting from leakage of long-term secret keys(passwords).The authors find that it is impossible to design a secure three-party PAKE protocol only based on password against password-compromise impersonation(PCI)attack.So the authors assume that the server realizes entity authentication using his public-key,and propose a novel three-party PAKE protocol based on elliptic curve cryptosystem(ECC),which can resist PCI attack.Furthermore, the authors prove that the proposed protocol is forward secrecy under the ECGDH assumption in the random oracle and ideal cipher models.
出处
《计算机学报》
EI
CSCD
北大核心
2010年第1期111-118,共8页
Chinese Journal of Computers
基金
国家“八六三”高技术研究发展计划项目基金(2007AA01Z431,SQ2008AA01Z3472853)资助~~