期刊文献+
共找到18篇文章
< 1 >
每页显示 20 50 100
BC-AKA:Blockchain Based Asymmetric Authentication and Key Agreement Protocol for Distributed 5G Core Network 被引量:1
1
作者 Zhen Gao Dongbin Zhang +3 位作者 Jiuzhi Zhang Zhao Liu Haoming Liu Ming Zhao 《China Communications》 SCIE CSCD 2022年第6期66-76,共11页
Secure authentication between user equipment and 5G core network is a critical issue for 5G system.However,the traditional authentication protocol 5 G-AKA and the centralized key database are at risk of several securi... Secure authentication between user equipment and 5G core network is a critical issue for 5G system.However,the traditional authentication protocol 5 G-AKA and the centralized key database are at risk of several security problems,e.g.key leakage,impersonation attack,MitM attack and single point of failure.In this paper,a blockchain based asymmetric authentication and key agreement protocol(BC-AKA)is proposed for distributed 5G core network.In particular,the key used in the authentication process is replaced from a symmetric key to an asymmetric key,and the database used to store keys in conventional 5G core network is replaced with a blockchain network.A proof of concept system for distributed 5G core network is built based on Ethereum and ECC-Secp256 k1,and the efficiency and effectiveness of the proposed scheme are verified by the experiment results. 展开更多
关键词 blockchain asymmetric authentication key agreement distributed core network 5G
在线阅读 下载PDF
Authenticated Key Agreement in Group Settings
2
作者 李明 王勇 +1 位作者 谷大武 白英彩 《Journal of Beijing Institute of Technology》 EI CAS 2006年第2期186-189,共4页
An enhanced definition of implicit key authentication and a secure group key agreement scheme from pairings are presented. This scheme combines the merits of group public key and key trees to achieve a communication-e... An enhanced definition of implicit key authentication and a secure group key agreement scheme from pairings are presented. This scheme combines the merits of group public key and key trees to achieve a communication-efficient and authenticated group key agreement protocol. Besides, it avoids dependence on signature or MAC by involving member's long-term keys and short-term keys in the group key. Furthermore, the idea behind this design can be employed as a general approach to extend the authenticated two-party Diffie-Hellman protocols to group settings. 展开更多
关键词 key agreement implicit key authentication key tree PAIRINGS
在线阅读 下载PDF
A Provably Secure Identity-based Authentication Multiple Key Agreement Protocol 被引量:2
3
作者 谭作文 《China Communications》 SCIE CSCD 2011年第2期26-33,共8页
An authentication multiple key agreement protocol allows the users to compute more than one session keys in an authentication way. In the paper,an identity-based authentication multiple key agreement protocol is propo... An authentication multiple key agreement protocol allows the users to compute more than one session keys in an authentication way. In the paper,an identity-based authentication multiple key agreement protocol is proposed. Its authentication part is proven secure against existential forgery on adaptively chosen message and ID attacks under the random oracle model upon the CDH assumptions. The session keys are proven secure in a formal CK security model under the random oracle model upon the CBDH assumptions. Compared with the previous multiple key agreement protocols,it requires less communication cost. 展开更多
关键词 authentICATION IDENTITY-BASED key agreement
在线阅读 下载PDF
An Improved User Authentication and Key Agreement Scheme Providing User Anonymity 被引量:1
4
作者 Ya-Fen Chang Pei-Yu Chang 《Journal of Electronic Science and Technology》 CAS 2011年第4期352-358,共7页
When accessing remote services over public networks, a user authentication mechanism is required because these activities are executed in an insecure communication environment. Recently, Wang et al. proposed an authen... When accessing remote services over public networks, a user authentication mechanism is required because these activities are executed in an insecure communication environment. Recently, Wang et al. proposed an authentication and key agreement scheme preserving the privacy of secret keys and providing user anonymity. Later, Chang et al. indicated that their scheme suffers from two security flaws. First, it cannot resist DoS (denial-of-service) attack because the indicators for the next session are not consistent. Second, the user password may be modified by a malicious attacker because no authentication mechanism is applied before the user password is updated. To eliminate the security flaws and preserve the advantages of Wang et aL's scheme, we propose an improvement in this paper. 展开更多
关键词 authentICATION key agreement smart card user anonymity.
在线阅读 下载PDF
A Provably Secure and PUF-Based Authentication Key Agreement Scheme for Cloud-Edge IoT
5
作者 Liquan Chen Jinlong Wang +2 位作者 Bangwei Yin Kunliang Yu Jinguang Han 《China Communications》 SCIE CSCD 2023年第5期198-216,共19页
With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying ... With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying issue that frequent end-edgecloud communication is over a public or adversarycontrolled channel.Additionally,with the presence of resource-constrained devices,it’s imperative to conduct the secure communication mechanism,while still guaranteeing efficiency.Physical unclonable functions(PUF)emerge as promising lightweight security primitives.Thus,we first construct a PUF-based security mechanism for vulnerable IoT devices.Further,a provably secure and PUF-based authentication key agreement scheme is proposed for establishing the secure channel in end-edge-cloud empowered IoT,without requiring pre-loaded master keys.The security of our scheme is rigorously proven through formal security analysis under the random oracle model,and security verification using AVISPA tool.The comprehensive security features are also elaborated.Moreover,the numerical results demonstrate that the proposed scheme outperforms existing related schemes in terms of computational and communication efficiency. 展开更多
关键词 Internet of Things end-edge-cloud orchestration secure communication physical unclonable function authentication key agreement
在线阅读 下载PDF
Improved quantum key agreement protocol with authentication
6
作者 郭继红 柏明强 +2 位作者 雷小燕 谢佳欣 莫智文 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第5期308-313,共6页
In order to make the quantum key agreement process immune to participant attacks, it is necessary to introduce the authentication in the communication process. A quantum key agreement protocol with identity authentica... In order to make the quantum key agreement process immune to participant attacks, it is necessary to introduce the authentication in the communication process. A quantum key agreement protocol with identity authentication that exploits the measurement correlation of six-particle entangled states is proposed. In contrast to some recently proposed quantum key agreement protocols with authentication, this protocol requires neither a semi-trusted third party nor additional private keys in the authentication process. The entire process of authentication and key agreement can be achieved using only n six-particle entangled states, which saves communication costs and reduces the complexity of the authentication process.Finally, security analysis shows that this scheme is resistant to some important attacks. 展开更多
关键词 quantum key agreement authentICATION six-particle entangled states
在线阅读 下载PDF
Toward an RSU-unavailable Lightweight Certificateless Key Agreement Scheme for VANETs 被引量:5
7
作者 SONG Jun HE Chunjiao +2 位作者 ZHANG Lei TANG Shanyu ZHANG Huanguo 《China Communications》 SCIE CSCD 2014年第9期93-103,共11页
Vehicle ad-hoc networks have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of a remarkable research on their security solutions,but in which there still lacks con... Vehicle ad-hoc networks have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of a remarkable research on their security solutions,but in which there still lacks considerations on how to secure vehicleto-vehicle communications,particularly when infrastructure is unavailable.In this paper,we propose a lightweight certificateless and oneround key agreement scheme without pairing,and further prove the security of the proposed scheme in the random oracle model.The proposed scheme is expected to not only resist known attacks with less computation cost,but also as an efficient way to relieve the workload of vehicle-to-vehicle authentication,especially in no available infrastructure circumstance.A comprehensive evaluation,including security analysis,efficiency analysis and simulation evaluation,is presented to confirm the security and feasibility of the proposed scheme. 展开更多
关键词 vehicle ad-hoc network securityand privacy lightweight authentication certificateless key agreement
在线阅读 下载PDF
Pairings-Based Protocol for Group Key Agreement
8
作者 李明 王勇 +1 位作者 谷大武 白英彩 《Journal of Beijing Institute of Technology》 EI CAS 2005年第2期221-224,共4页
An authenticated group key agreement protocol suite (PAGKA) based on pairings is presented in this paper. This suite extends an efficient Diffie-Hellman-based protocol suite by introducing parings on elliptic curves a... An authenticated group key agreement protocol suite (PAGKA) based on pairings is presented in this paper. This suite extends an efficient Diffie-Hellman-based protocol suite by introducing parings on elliptic curves and public-key certificates. The result suite builds its security on the hardness of the bilinear Diffie-Hellman (BDH) problem in the random oracle model, and provides implicit key authentication, perfect forward secrecy and unknown key-share secrecy. 展开更多
关键词 key agreement authentICATION PAIRINGS
在线阅读 下载PDF
基于身份保护的高效3GPP AKA协议 被引量:5
9
作者 石亚宾 黄开枝 贺晓珺 《电讯技术》 2008年第11期19-23,共5页
针对3GPP AKA协议中存在的安全缺陷,在消息中加入访问网络的身份信息,利用秘密令牌机制,提出了一种可以防止重定向攻击、SQN同步缺陷和用户身份信息泄露的改进方案,并对其安全性和效率进行了分析。分析表明,本方案可以有效解决上述问题... 针对3GPP AKA协议中存在的安全缺陷,在消息中加入访问网络的身份信息,利用秘密令牌机制,提出了一种可以防止重定向攻击、SQN同步缺陷和用户身份信息泄露的改进方案,并对其安全性和效率进行了分析。分析表明,本方案可以有效解决上述问题,以较少的资源开销就能获取协议效率和安全性能的提高。 展开更多
关键词 网络安全 3GPP aka 认证 密钥协商 身份保护
在线阅读 下载PDF
不同PKG环境下可证安全的基于身份AKA协议 被引量:2
10
作者 夏松 权建校 韩文报 《电子与信息学报》 EI CSCD 北大核心 2010年第10期2393-2399,共7页
目前大多数基于身份认证密钥协商协议需要参与协议双方在同一个PKG环境下,而实际应用中需要在不同PKG环境下的用户之间也能进行安全通信。该文结合twin Diffie-Hellman问题提出了一个全新的不同PKG环境下的基于身份认证密钥协商协议。利... 目前大多数基于身份认证密钥协商协议需要参与协议双方在同一个PKG环境下,而实际应用中需要在不同PKG环境下的用户之间也能进行安全通信。该文结合twin Diffie-Hellman问题提出了一个全新的不同PKG环境下的基于身份认证密钥协商协议。利用Cash等人在2008年欧密会上提出的"trapdoor test"技术在eCK模型中将新协议的安全性规约到标准的CDH和BDH假设。 展开更多
关键词 密码学 认证密钥协商 基于身份 双线性对 不同PKG环境 TRAPDOOR test技术
在线阅读 下载PDF
基于串空间模型的UMTS AKA协议安全分析与改进 被引量:2
11
作者 邢媛 蒋睿 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2010年第6期1163-1168,共6页
通过分析Oh等设计的T-AKA协议,发现该协议无法实现网络对用户的正确认证及消息的新鲜性验证,并利用该安全漏洞构造出了伪冒用户的攻击方法.然后,在3GPP规范的基础上,在服务网络端引入公钥机制,提出了改进的认证与密钥协商协议.最后,应... 通过分析Oh等设计的T-AKA协议,发现该协议无法实现网络对用户的正确认证及消息的新鲜性验证,并利用该安全漏洞构造出了伪冒用户的攻击方法.然后,在3GPP规范的基础上,在服务网络端引入公钥机制,提出了改进的认证与密钥协商协议.最后,应用串空间模型理论及认证测试方法,对改进协议的机密性和双向认证正确性进行了形式化证明.研究结果表明:改进协议能够保证消息的新鲜性和网络-用户间的双向认证,克服T-AKA协议中存在的伪冒用户攻击及其他重放、伪冒攻击,具有高的安全性;协议设计中保留了3GPP规范的框架,避免了用户终端进行繁重的公钥运算,具有强的实用性. 展开更多
关键词 aka协议 认证 安全 UMTS 串空间模型 认证测试
在线阅读 下载PDF
Lightweight Mutual Authentication Scheme for Protecting Identity in Insecure Environment 被引量:2
12
作者 Xu Wu Jin Xu Binxing Fang 《China Communications》 SCIE CSCD 2018年第6期158-168,共11页
Many improved authentication solutions were put forward, on purpose of authenticating more quickly and securely.However, neither the overuse of hash function,or additional symmetric encryption, can truly increase the ... Many improved authentication solutions were put forward, on purpose of authenticating more quickly and securely.However, neither the overuse of hash function,or additional symmetric encryption, can truly increase the overall security. Instead,extra computation cost degraded the performance.They were still vulnerable to a variety of threats, such as smart card loss attack and impersonation attack, due to hidden loopholes and flaws. Even worse, user's identity can be parsed in insecure environment, even became traceable. Aiming to protect identity, a lightweight mutual authentication scheme is proposed. Redundant operations are removed,which make the verification process more explicit. It gains better performance with average cost compared to other similar schemes.Cryptanalysis shows the proposed scheme can resist common attacks and achieve user anonymity.Formal security is further verified by using the widely accepted Automated Validation of Internet Security Protocols and Applications(AVISPA) tool. 展开更多
关键词 identify authentication light-weight authentication session key agreement user anonymity
在线阅读 下载PDF
基于PCL的3GPP-AKA协议的形式化分析与证明
13
作者 张涛 《电子科技》 2009年第4期60-62,共3页
3GPP-AKA协议在第三代移动通信的安全性方面起着至关重要的作用,它保证了移动用户MS与VLR/HLR之间的双向认证及密钥协商。文中通过协议组合逻辑(PCL)对3GPP-AKA协议进行了形式化分析及安全性证明。分析表明3GPP-AKA协议可以满足它的安... 3GPP-AKA协议在第三代移动通信的安全性方面起着至关重要的作用,它保证了移动用户MS与VLR/HLR之间的双向认证及密钥协商。文中通过协议组合逻辑(PCL)对3GPP-AKA协议进行了形式化分析及安全性证明。分析表明3GPP-AKA协议可以满足它的安全目标,因此该协议可以安全的作为第三代移动通信中的认证和密钥分配协议。 展开更多
关键词 3GPP—aka协议 认证和密钥协商 协议组合逻辑
在线阅读 下载PDF
一种改进的WLAN-3G融合网络认证协议 被引量:5
14
作者 刘云 范科峰 +2 位作者 张素兵 莫玮 沈玉龙 《电子学报》 EI CAS CSCD 北大核心 2010年第2期399-404,共6页
本文在分析了现有3GPP WLAN-3G融合网络接入认证协议EAP-AKA的优势和不足的基础上,引入WAPI证书鉴别机制,提出WAPI-3G互联结构模型,并针对该互联模型设计了一种接入认证协议EAP-WAPI.本文提议的WLAN-3G互联结构模型及接入认证机制解决... 本文在分析了现有3GPP WLAN-3G融合网络接入认证协议EAP-AKA的优势和不足的基础上,引入WAPI证书鉴别机制,提出WAPI-3G互联结构模型,并针对该互联模型设计了一种接入认证协议EAP-WAPI.本文提议的WLAN-3G互联结构模型及接入认证机制解决了融合组网环境下WLAN终端统一接入认证的问题.分析和仿真结果表明,相比于原有的WAPI认证协议WAPI-XG1,本文所提议的协议具有较高的安全性和执行效率. 展开更多
关键词 无线通信 无线局域网(WLAN) 第三代移动通信系统(3G) 融合网络 可扩展认证协议(EAP) 无线局域网鉴别和保密基础结构(WAPI) 接入认证
在线阅读 下载PDF
TD-LTE电力专网接入机制的研究及改进 被引量:3
15
作者 张琪 曹宁 +1 位作者 丁沿 刘甜 《信息技术》 2015年第3期105-108,共4页
为了更好地适应电力专网的安全需求,结合IEC 62351标准,分析了TD-LTE的认证与密钥协商协议EPS-AKA,发现其存在安全性不够高,扩展性差等不足。针对这些不足并考虑到电力专网所需基站较少的实际情况,提出了一种基于无线公钥体制的改进协议... 为了更好地适应电力专网的安全需求,结合IEC 62351标准,分析了TD-LTE的认证与密钥协商协议EPS-AKA,发现其存在安全性不够高,扩展性差等不足。针对这些不足并考虑到电力专网所需基站较少的实际情况,提出了一种基于无线公钥体制的改进协议,实现了实体间的双向身份认证,保护了用户和网络标识等关键信息,增强了安全性和可扩展性。最后通过形式化方法证明了改进协议的安全性和有效性。 展开更多
关键词 IEC 62351 无线公钥体制 认证与密钥协商 认证测试
在线阅读 下载PDF
两个认证密钥协商协议的前向安全性分析 被引量:2
16
作者 程庆丰 马玉千 《电子与信息学报》 EI CSCD 北大核心 2022年第12期4294-4303,共10页
目前,网络安全及隐私受到广泛关注。前向安全性是Günther在1989年提出的一种认证密钥协商协议(AKA)的安全属性(doi:10.1007/3-540-46885-4_5),该性质经过30年的蓬勃发展已经成为研究领域的热点之一。该文主要分析了MZK20和VSR20两... 目前,网络安全及隐私受到广泛关注。前向安全性是Günther在1989年提出的一种认证密钥协商协议(AKA)的安全属性(doi:10.1007/3-540-46885-4_5),该性质经过30年的蓬勃发展已经成为研究领域的热点之一。该文主要分析了MZK20和VSR20两个AKA协议。首先在启发式分析的基础上,利用BAN逻辑分析了MZK20协议不具有弱前向安全性;其次利用启发式分析和Scyther工具证明了VSR20协议不具备前向安全性。最后,在分析VSR20协议设计缺陷的基础上,提出了改进方案,并在eCK模型下证明了改进后协议的安全性;并且,结合Scyther软件证明了改进VSR20协议与VSR20协议相比明显提高了安全性。 展开更多
关键词 安全协议形式化工具分析 认证密钥协商协议 前向安全性
在线阅读 下载PDF
通用引导架构在IMS网络中的应用研究 被引量:3
17
作者 缪永生 盛国平 张宝健 《中兴通讯技术》 2014年第4期40-43,共4页
介绍了通用引导架构(GBA)在IMS网络中的组网和应用,并从终端安全、算法安全、向量共享等方面进行了深入分析。认为GBA在IMS网络中应用还属于探索阶段。同时对GBA架构在IMS网络中应用提出了一些建设性意见,包括共享向量、采用SHA-1算法... 介绍了通用引导架构(GBA)在IMS网络中的组网和应用,并从终端安全、算法安全、向量共享等方面进行了深入分析。认为GBA在IMS网络中应用还属于探索阶段。同时对GBA架构在IMS网络中应用提出了一些建设性意见,包括共享向量、采用SHA-1算法、采用UICC卡、合一部署等,以指导GBA在IMS网络中的部署和商用。 展开更多
关键词 GBA 通用认证架构 IMS aka
在线阅读 下载PDF
基于自认证的LTE-R系统验证方案研究 被引量:1
18
作者 房艳华 《信息通信》 2012年第6期1-2,共2页
针对当前GSM-R网络身份认证与密钥协商方案存在扩展性差、用户身份信息易泄露的问题,本文为下一代高速铁路无线通信系统LTE-R提出一种基于自认证公钥体制的认证与密钥协商协议,实现实体间双向身份认证,保护空中接口及有线通信链路。
关键词 安全 自认证 认证与密钥协商协议
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部