全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
电子学报  2014 

基于智能卡的强安全认证与密钥协商协议

DOI: 10.3969/j.issn.0372-2112.2014.08.020, PP. 1587-1593

Keywords: 认证与密钥协商协议,临时密钥泄露攻击,智能卡和口令,安全模型

Full-Text   Cite this paper   Add to My Lib

Abstract:

将认证与密钥协商(AuthenticatedKeyAgreement,AKA)协议所需的一种强安全属性——抗临时密钥泄露攻击引入到基于智能卡和口令的AKA协议中,基于NAXOS方法分别提出了基于智能卡的两方强安全AKA协议和三方强安全AKA协议.同时,首次给出了包含临时密钥泄露攻击的基于智能卡和口令的AKA协议的安全模型,并在该模型下给了所提出协议的安全性证明.此外,文中还分析了抗临时密钥泄露攻击不能在仅使用口令的AKA协议中实现的原因.

References

[1]  刘云,杨亮,等.一种改进的动态用户认证协议[J].电子学报,2012,41(1):42-46. Liu Yun,Yang Liang,et al.Improved dynamic user authentication protocol[J].Acta Electronica Sinica,2012,41(1):42-46.(in Chinese)
[2]  A Akavia,S Goldwasser,V Vaikuntanathan.Simultaneous hardcore bits and cryptography against memory attacks[A].Proceedings of the 6th Theory of Cryptography Conference (TCC 2009)[C].Berlin:Springe-Verlag,2009.474-495.
[3]  B Lamacchia,K Lauter,A Mityagin.Stronger security of authenticated key exchange[A].Proceedings of ProvSec 2007[C].Berlin:Springe-Verlag,2007.1-16.
[4]  J Alwen,Y Dodis,D Wichs.Leakage-resilientpublic-key cryptography in the bounded-retrieval model[A].Advances in Cryptology,Crypto 2009[C].Berlin:Springe-Verlag,2009.36-54.
[5]  T Okamoto.Authenticated key exchange and key encapsulation in the standard model[A].Advances in Cryptology,Asiacrypt 2007[C].Berlin:Springe-Verlag,2007.474-484.
[6]  M Kim,A Fujioka,B Usta[AKo~]lu.Strongly secure authenticated key exchange without NAXOS''approach[A].Proceedings of 4th International Workshop on Security(IWSEC''09)[C].Berlin:Springe-Verlag,2009.174-191.
[7]  张延红,陈明.标准模型下强安全的无证书认证密钥协商协议[J].四川大学学报,2013,45(1):125-132. Zhang Yan hong,Chen Min.Strongly secure certificateless authenticated key agreement protocol in standard model[J].Journal of Sichuan University,2013,45(1):125-132.(in Chinese)
[8]  K Yoneyama.Efficient and strongly secure password-based server aided key exchange[A].Proceedings of 9th International Conference on Cryptology in India(Indocrypt''08)[C].Berlin:Springe-Verlag,2010.172-184.
[9]  J Zhao,D Gu.Provably secure three-party password-based authenticated key exchange protocol[J].Information Sciences,2012,184(1):310-323,2012.
[10]  J Nam,J Paik,D Won.Security analysis of Zhao and Gu''s key exchange protocol[EB/OL].http://onlinepresent.org/proceedings/vol2_2012/15.pdf.
[11]  M Bellare,D Pointcheval,P Rogaway.Authenticated key exchange secure against dictionary attacks[A].Advances in Cryptology,Eurocrypt 2000[C].Berlin:Springe-Verlag,2000.139-155.
[12]  X Li,J Niu,MK Khan,et al.An enhanced smart card based remote user password authentication scheme[J].Journal of Network and Computer Applications,2013,36(5):1365-1371.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133