期刊文献+

一种新的跨域C2C-PAKE协议

A new Cross-Realm C2C-PAKE Protocol
在线阅读 下载PDF
导出
摘要 跨域客户到客户基于口令认证的密钥交换(C2C-PAKE)协议具有重要的应用价值。但是,目前的大部分C2C-PAKE协议都无法抵抗口令泄露攻击。该文给出了一个新的跨域客户到客户的口令认证密钥交换协议。该协议带有签名体制且交互次数较少。随后,在一般模型下对给出的协议进行了安全性证明。该协议可以抵抗口令泄露等各种攻击,并且具有前向安全性质。 Cross-realm client-to-client password-authenticated key exchange(C2C-PAKE) protocols are important in web communication.But most C2C-PAKE protocols can not resist password-compromise impersonation attack.This paper provides a new cross-realm C2C-PAKE protocol with signature scheme and low communication cost.Then the security of the protocal is proved under general model.The new protocol can be resistant to many attacks such as password-compromise impersonation attack and so on.Furthermore,this protocol provides the property of the perfect forward secrecy.
作者 夏鹏 刘昌明
出处 《计算机与数字工程》 2011年第5期92-96,共5页 Computer & Digital Engineering
关键词 跨域 C2C-PAKE 签名 口令泄露攻击 cross-realm C2C-PAKE signature password-compromise impersonation attack
  • 相关文献

参考文献9

  • 1Byun J W, Jeong I R, Lee D H, et al. Password-Authenticated Key Exchange between Clients with Different Passwords[C]//ICICS 2002, LNCS 2513. Berlin: Springer-Verlag, 2002: 134 - 146.
  • 2Kim J, Kim S, Kwak J, et al. Cryptoanalysis and Improvements of Password Authenticated Key Exchange Scheme Between Clients with Different Passwords [C]//ICCSA 2004, LNCS 3044. Berlim Springer-Vetlag, 2004: 895-890.
  • 3Yin Y, Li B. Secure Cross-Realm C2C-PAKE Protocol [C]//ACISP 2006, LNCS 4058. Berlin: Springer-Verlag, 2006 : 395-406.
  • 4Byun J W, Lee D H, Lim J. Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol[C]//APWeb 2006. LNCS 3841. Berlin: Springer-Verlag, 2006 : 830-836.
  • 5Li Z J, Guo H, Zhang X Y. Efficient and Provably Secure Generic Construction of Client-to-Client Password- Based Key Exchange Protocol[C]//ENTCS 2008. Berlin: Springer-Verlag, 2008 : 257- 268.
  • 6Wang F F, Zhang Y Q. Cryptanalysis of a Client-to- Client Password-Authenticated Key Agreement Protocol. Cryptology ePrint Archive, Report 2008/248. http ://eprint. iacr. org/, 2008.
  • 7Abdalla M, Pointcheval D. Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication[C]//FC 2005, LNCS 3570, Springer, 2005 : 341-356.
  • 8Bellare M, Rogaway P. Provably Secure Session Key Distribution: the three party cases[C]//STOC 1995, ACM. Berlin: Springer-Verlag, 1995 : 57-66.
  • 9Bellare M, Pointcheva D, Rogaway P. Authenticated Key Exchange Secure Against Dictionary Attacks[C]// EUROCRYPT 2000, LNCS 1807. Berlin: Springer- Verlag, 2000 : 139- 155.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部