首页> 外文期刊>International journal of communication networks and distributed systems >Three-party password-based authenticated key exchange protocol based on the computational Diffie-Hellman assumption
【24h】

Three-party password-based authenticated key exchange protocol based on the computational Diffie-Hellman assumption

机译:基于计算Diffie-Hellman假设的基于三方密码的认证密钥交换协议

获取原文
获取原文并翻译 | 示例
           

摘要

The three-party password-based authenticated key exchange protocol gives two clients the ability to negotiate a session key through a trusted server over a public channel. Most of the proposed 3PAKE protocols use public keys to guarantee identities; however, the sharing of public keys may lead to various types of attacks, such as a man-in-the-middle attack, which allows an attacker to simply intercept and insert traffic traversing a network. In this paper, we briefly describe an updated three-party password-based authenticated key exchange protocol and analyse its security. The proposed TPAKE protocol does not share plain-text data. Data shared between the parties are either hashed or encrypted. Using the random oracle model, the security of the proposed TPAKE protocol is formally proven under the computational Diffie-Hillman assumption. Furthermore, the analyses included in this paper show that our protocol can ensure perfect forward secrecy and can also resist many types of common attacks.
机译:基于三方密码的身份验证密钥交换协议使两个客户端能够通过公用通道通过受信任的服务器协商会话密钥。大多数提议的3PAKE协议都使用公共密钥来保证身份。但是,共享公共密钥可能会导致各种类型的攻击,例如中间人攻击,这种攻击使攻击者可以简单地拦截并插入穿越网络的流量。在本文中,我们简要描述了一个更新的基于第三方的基于身份验证的密钥交换协议,并分析了其安全性。提出的TPAKE协议不共享纯文本数据。各方之间共享的数据被散列或加密。使用随机预言模型,在计算Diffie-Hillman假设下正式证明了所提出的TPAKE协议的安全性。此外,本文包含的分析表明,我们的协议可以确保完美的前向保密性,并且还可以抵抗多种类型的常见攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号