首页> 中文学位 >On the Design of Efficient and Secure Authenticated Key Exchange Protocol
【6h】

On the Design of Efficient and Secure Authenticated Key Exchange Protocol

代理获取

目录

第一个书签之前

Contents

List of Figures

List of Tables

Chapter 1 Authenticated Key Exchange Protocols

1.1 Definition

1.2 Historical Background

1.3 Related Works

1.4 Problem Definition

1.5 Contributions

1.6 Objectives

1.7 Organization of This Dissertation

Chapter 2 Preliminaries and fundamentals

2.1 Cryptography goals

2.2 Key Exchange Protocols

2.2.1 Authenticated Key Exchange Protocols(AKE)

2.2.2 Non-Interactive Key Exchange Protocols(NIKE)

2.2.3 One-Round Key Exchange Protocols(ORKE)

2.2.4 Password-based authenticated key-exchange

2.3 Computational Assumptions

2.3.1 Discrete Log Problem

2.3.2 Computational Diffie-Hellman (CDH) Assumption

2.3.3 Decisional Diffie-Hellman (DDH) Assumption

2.3.4 The Decision Linear Diffie-Hellman Assumption

2.3.5 Linear Diffie-Hellman

2.4 Cryptographic Tools

2.4.1 Randomness Extractor

2.4.2 Pseudo-Random Functions

2.4.3 Hash Proof System

2.4.4 Chameleon Hash Function

2.4.5 One-Time Lossy Filter (OT-LF)

2.4.6 Lossy Trapdoor Function and All-But-One Trapdoor Function

2.5 Security Models for Key Exchange Protocols

2.5.1 Definitions

2.5.2 Security of Authenticated Key Exchange

2.5.3 Historical Background

2.5.4 Overview of AKE security models

2.5.5 The efficiency of AKE security models

2.6 The eCK security model

2.6.1 Introduction

2.6.2 Previous Works

2.7 Summary

Chapter 3 Authenticated Key Exchange Protocols without NAXOS approach

3.1 NAXOS approach definition

3.2 Motivation

3.3 Efficient Secure Authenticated Key Exchange without NAXOS' approach based on Decision Linear Problem

3.3.1 Contributions

3.3.2 Parameters

3.3.4 Protocol Security

3.4 Tightly-Secure Authenticated Key Exchange without NAXOS' approach based on Decision Linear Problem

3.4.1 Contributions

3.4.2 Parameters

3.4.3 Protocol description

3.4.4 Protocol Security

3.6 Summary

Chapter 4 Authenticated Key Exchange Protocols In standard model

4.1 Motivation

4.2 Contributions

4.3 A Generic adaptively-secure AKE Construction from HPS

4.3.1 Protocol Description

4.3.2 Security Analysis

4.4 Instantiation from the DDH Assumption

4.4.1 A DDH-Based HPS

4.4.2 The DDH-Based instantiation AKE Scheme from scheme in section 4.3

4.5 Efficiency

4.6 Summary

Chapter 5 Leakage-resilient Authenticated Key exchange protocol from hash proof system and One-Time lossy filter

5.1 Introduction

5.1.1 Bounded-Leakage Model

5.1.2 Motivating Problem

5.1.3 Contributions

5.2 ALR-eCK security model

5.3 A Generic adaptively-secure AKE Construction from HPS and one-time lossy filter

5.3.1 Protocol Description

5.3.2 Security Analysis

5.4 Instantiation from the DDH Assumption

5.4.1 A HPS from the DDH Assumption

5.4.2 A OT-LF from the DDH Assumption

5.4.3 The DDH-Based instantiation Leakage-Resilient AKE Scheme from scheme in section 5.3

5.5 Efficiency

5.6 Overview of Our Results

5.7 Summary

Chapter 6 Conclusions and Future Work

6.1 Conclusions

6.2 Future Work

A.2 Proof of theorem 3.2

Acknowledgements

References

A.3 Proof of theorem 4.1

A.4 Proof of theorem 4.2

A.5 Proof of theorem 4.3

A.6 Proof of theorem 5.3

A.7 Proof of theorem 5.5

Research Results Obtained During the Study for Doctor Degree

展开▼

著录项

相似文献

  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号