期刊文献+

采用阈下信道的两方口令认证密钥交换协议

Two-Party Password-Authenticated Key Exchange Protocol Based on the Subliminal Channel
在线阅读 下载PDF
导出
摘要 提出一种基于阈下信道的两方口令认证密钥交换协议.协议中,服务器存储用户口令的验证值抵御服务器泄漏伪装攻击,用户的口令明文采用阈下信道生成签名信息传送给服务器,服务器计算出用户的口令明文恢复出阈下信息,再计算口令验证值以实现对用户身份的认证,从而建立起会话密钥.对所提协议的安全性和效率进行分析,结果表明:所提出的协议安全可行且有效. A two-party password-authenticated key exchange protocol based on the subliminal channel was proposed.In the proposed protocol,the server stores the user′s password verifier to withstand the server′s compromise and guise attacks,the user′s password cleartext is made to a signature message with the subliminal channel to transmit to the server, the server computes the user′s password cleartext to renew the subliminal message,then the server calculates the pass-word verifier to authenticate the user′s identity,so a session key is made between the server and the user.The security and the efficiency of the proposed protocol were analyzed,it shows in the analysis that the proposed protocol is secure and effective.
出处 《华侨大学学报(自然科学版)》 CAS 北大核心 2014年第6期665-668,共4页 Journal of Huaqiao University(Natural Science)
基金 国家自然科学基金资助项目(61272382) 广东省自然科学基金资助项目(S2012010009963) 广东省茂名市科技计划项目(20130350)
关键词 阈下信道 口令认证密钥交换协议 口令验证值 会话密钥 subliminal channel password-authenticated key exchange protocol password verifier session key
作者简介 通信作者:项顺伯(1979-),男,讲师,主要从事计算机网络与密码协议的研究.E-mail:qingcheng33@163.com.
  • 相关文献

参考文献13

  • 1SIMMONS G J. The prisoner's problem and the subliminal channel[C]ffProceedings IEEE Workshop Communica-tions Security CRYPTO. New York: [s. n. ], 1983..51-67.
  • 2SIMMONS G J. The history of subliminal channels[J]. IEEE Journal on Selected Areas in Communication, 1998,16 (4) : 452-462.
  • 3杨建萍,周贤伟,杨军.基于阈下信道技术的身份认证机制研究[J].微电子学与计算机,2004,21(12):195-197. 被引量:4
  • 4LEE S W, KIM W H, KIM H S, et al. Efficient password-based authenticated key agreement protocolLC ]///Interna- tional Conference on Computer Science and Applications. Perugia.. Springer-Verlag, 2004:617-626.
  • 5KWON J O, SAKURAI K, LEE D H. One-round protocol for two-party verifier-based password-authenticated key exchange[C]//Communications and Multimedia Security. Heraklion. Es. n. ] ,2006: 87-96.
  • 6粟栗,崔国华,李俊,郑明辉.基于签密的分布式安全门限阈下信道方案[J].小型微型计算机系统,2007,28(12):2153-2157. 被引量:1
  • 7谭示崇,张宁,王育民.新的口令认证密钥协商协议[J].电子科技大学学报,2008,37(1):17-19. 被引量:6
  • 8李文敏,温巧燕,张华.基于验证元的三方口令认证密钥交换协议[J].通信学报,2008,29(10):149-152. 被引量:14
  • 9POINTCHEVAL D. Password-based authenticated key exchange[C]//Proceedings of 15th IACR International Con- ference on Practice and Theory of Public-Key Cryptography. Darmstadt, Springer-Verlag, 2012:390-397.
  • 10FUJIOKA A, SUZUKI K, XAGAWA K, et al. Strongly secure authenticated key exchange from factoring, codes, and lattices[C]//Proceedings of 15th IACR International Conference on Practice and Theory of Public-Key Cryp- tography. Darmstadt. Springer-Verlag, 2012 .. 467-484.

二级参考文献40

  • 1董庆宽,肖国镇.阈下信道分类及边信息协商问题研究[J].计算机科学,2004,31(5):103-106. 被引量:1
  • 2冯鉴.签名方案中阈下信道的构造[J].计算机工程,2005,31(11):146-148. 被引量:2
  • 3陈伟东,冯登国,谭作文.指定验证方的门限验证签名方案及安全性证明[J].软件学报,2005,16(11):1967-1974. 被引量:8
  • 4BELLARE M, ROGAWAY E Provably secure session key distribution-the three party case[A]. Proceedings of the 27th ACM Symposium on Theory of Computing[C]. Las Vegas: ACM, 1995.57-66.
  • 5CHANG C C, CHANG Y E A novel three-party encrypted key exchange protocol[J]. Computer Standards and Interfaces, 2004, 26(5): 471-476.
  • 6SUN H M, CHEN B C, HWANG T. Secure key agreement protocols for three-party against guessing attacks[J]. Journal of Systems and Software, 2005, 75(1-2): 63-68.
  • 7LEE S W, KIM H S, YOO K Y. Efficient verifier-based key agreement protocol for three parties without server's public key[J]. Applied Mathematics and Computation, 2005, 167(2): 996-1003.
  • 8ABDALLA M, CHEVASSUT O, FOUQUE P A, et al. A simple threshold authenticated key exchange from short secrets[A]. Proc. Asiacrypt'05[C]. Chennai, India, 2005. 566-584.
  • 9KWON J O, JEONG I R, SAKURAI K, et al. Efficient verifier-based password-authenticated key exchange in the three-party setting[J]. Computer Standards and Interfaces, 2007. 513-520.
  • 10LEE S W, KIM H S, YOO K Y. Improvement of Lee and Lee's authenticated key agreement scheme[J]. Applied Mathematics and Computation, 2005, 162(3): 1049-1053.

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部