浏览全部资源
扫码关注微信
河南理工大学计算机科学与技术学院,河南 焦作 454000
[ "于金霞(1974–),女,河南博爱人,博士,河南理工大学教授,主要研究方向为人工智能、信息安全。" ]
[ "廉欢欢(1993–),女,河南沁阳人,河南理工大学硕士生,主要研究方向为信息安全、密码学。" ]
[ "汤永利 (1972-),男,河南孟州人,博士,河南理 工大学教授、硕士生导师,主要研究方向为信息安全、密码学。" ]
[ "史梦瑶(1998–),女,河南许昌人,河南理工大 学硕士生,主要研究方向为信息安全、密码学。" ]
[ "赵宗渠(1974–),男,河南沁阳人, 博士,河南理工大学讲师,主要研究方向为密码学、网络安全、恶意代码分析。" ]
网络出版日期:2018-11,
纸质出版日期:2018-11-25
移动端阅览
于金霞, 廉欢欢, 汤永利, 等. 格上基于口令的三方认证密钥交换协议[J]. 通信学报, 2018,39(11):87-97.
Jinxia YU, Huanhuan LIAN, Yongli TANG, et al. Password-based three-party authenticated key exchange protocol from lattices[J]. Journal on communications, 2018, 39(11): 87-97.
于金霞, 廉欢欢, 汤永利, 等. 格上基于口令的三方认证密钥交换协议[J]. 通信学报, 2018,39(11):87-97. DOI: 10.11959/j.issn.1000-436x.2018237.
Jinxia YU, Huanhuan LIAN, Yongli TANG, et al. Password-based three-party authenticated key exchange protocol from lattices[J]. Journal on communications, 2018, 39(11): 87-97. DOI: 10.11959/j.issn.1000-436x.2018237.
三方口令认证密钥交换协议允许用户通过一个服务器在不安全的信道中建立一个受保护的会话密钥,而现有的格上PAKE协议绝大多数都是针对两方设计的,无法适用于大规模的通信系统。基于此,提出一种新的格上三方PAKE协议,该协议主要以可拆分公钥加密体制及其相应的近似平滑投射散列函数为基础进行构造,并通过在协议中引入消息认证机制的方式来防止消息重放攻击。与同类协议相比,所提协议减少了通信轮数,提高了效率和协议应用的安全性。
Password-based three-party authenticated key exchange protocol allow clients to establish a protected session key through a server over insecure channels.Most of the existing PAKE protocols on lattices were designed for the two parties
which could not be applied to large-scale communication systems
so a novel three-party PAKE protocol from lattices was proposed.The PAKE protocol was constructed by using a splittable public-key encryption scheme and an associated approximate smooth projective Hash function
and message authentication mechanism was introduced in the protocol to resist replay attacks.Compared with the similar protocols
the new protocol reduces the number of communication round and improves the efficiency and the security of protocol applications.
BELLOIN S M , MERRITT M . Encrypted key exchange:passsword-based protocols secure against dictionarry attacks [C ] // IEEE Symposium o on Research in Seccurity and Privacy . 1992 : 72 - 84 .
KATZ J , OSTROVSKY R , YU NG M . Efficient pa assword-authenticated key exchangge using human-memorable passworrds [M ] . Advances in Cryptology-EUROCRYPT . 2000 1 : 475 - 494 .
ZHAO J , GU D . Provably secure three-party password-based authe enticated key eexchange protocol [J ] . Information Sciiences , 2012 , 184 ( 11 ): 310 - 323 .
FARASH M S , ISLAM S H , OBAIDAT M S . A provably secure and efficient two-party password‐based explicit authennticated key exchan ge protocol resiistance to passworrd guessing attackss [J ] . Concurrency &Computation Practice & Experieence , 2015 , 27 ( 17 ): 4897 - 4913 .
ABLALLA M , BENHAMOUDA F , MACKENZ IIE P . Security of the J-PAKE passsword-authenticateed key exchangee protocol [C ] // IE EE Symposium oon Security and Priivacy . 2015 : 571 - 5887 .
魏福山 , 马建峰 , 李光松 , 等 . 标准模型下高效的三方口令认证密钥交换协议[ [J ] . 软件学报 , 2016 , 27 ( 9 ): 2389 - 2399 .
WEI F S , MA J F , LI G S , et al . Efficient three-party password-based authenticatedd key exchange prootocol in the standaard model [J ] . Journ nal of Software , 2016 , 27 ( 9 ): 2389 - 2399 .
KATZ J , VAIKUNTANATH AN V . Smooth proojective hashing and password-bassed authenticated key exchange froom lattices [M ] . Advances in Cry yptology-ASIACRYPT . 2009 : 636 - 652 .
GENNARO R , LINDELL Y . A framework for password-based autheenticated key e exchange [C ] // Internnational Conference on the Theory annd Applications of Cryptographic Techniques . 2003 : 5524 - 543 .
DING Y , FAN L . Efficient ppassword-based authenticated key exchange from lattices [C ] // Seventth International Coonference on Compputational Intellligence and Securitty . 2012 : 934 - 938 .
GROCE A , KATZ J . A new fr ramework for efficcient password-baseed authenticated key exchange [C ] // /Proceedings of thhe 17th ACM confe erence on Computer and communnications security . 2010 : 516 - 525 .
叶茂 , 胡学先 , 刘文芬 . 基于格的三方口令认证密钥交换协议 [J ] . 电子与信息学报 , 2013 , 35 ( 6 ): 1376 - 1381 .
YE M , HU X X , LIU W F . Pas sword authenticateed key exchange protocol in the three party settingg based on lattices [J ] . Journal of Eleectronics & Infformation Technoloogy , 2013 , 35 ( 6 ): 1376 - 1381 .
PEIKERT C . Lattice cryptograpphy for the internet [M ] . Post-Quantuum Cryptographyy . 2014 : 197 - 219 .
ZHANG J , ZHANG Z , DING J , et al . Authentiicated key exchang ge from ideal latttices [M ] . Advancees in Cryptology -EUROCRYPT . 2015 : 719 - 751 .
赵秀凤 , 高海英 , 王爱兰 . 基于 RLWE 的身份基认证密钥交换协议 [J ] . 计算机研究与发展 , 2016 , 53 ( 11 ): 2482 - 2490 .
ZHAO X F , GAO H Y , WANG A L . An identity-based auuthenticated key exchange protocoll from RLWE [J ] . JJournal of Compute er Research and Development , 2016 , 53 ( 11 ): 2482 - 2449
XU D Q , HE D B , CHOO K K R . Prov vably secure three-party passworrd authenticated keyy exchange protocool based on ring leaarning with erroor [C ] // IACR Cryptoology ePrint Archivve . 2017 :360.
ZHANG J , YU Y . Two-round PAKE fro om approximate SPH and instanntiations from latticces [C ] // International Conference on the Theory and Application of Cryyptology and Infor mation Security . 2017 : 37 - 67 .
REGEV O , . On latticess,learning with errrors,random linear codes,and crypptography [C ] // ACM Symposium on Theory of Compu uting . 2005 : 84 - 993 .
BE LLARE M , POIN TCHEVAL D , ROGAWAY P . Authen nticated key exchhange secure againnst dictionary attaccks [M ] . Advances in Cryptologyy-EUROCRYPT . 2000 : 139 - 155 .
ABE M , CUI Y , IMAI H , et al . Efficient hybrid encryption froom ID-based encr ryption [J ] . Designs Codes & Cryptograpphy , 2010 , 54 ( 3 ): 205 - 240 .
RAN C , HALEVI S , KATZ J . Chosen-ciiphertext security from identity-bbased encryption [C ] // International Coonference on the Theory and Appplications of Cryptoographic Techniquees . 2004 : 207 - 222 .
CRAMER R , SHOUP V . Universal hassh proofs and a paradigm for adapptive chosen cipheertext secure publicc-key encryption [C ] // Internationnal Conference on the Theory and Applications of Cryyptographic Tech hniques:Advances in Cryptology . 2002 : 45 - 64 .
KA TZ J , VAIKUNTANATHAN V . Round-optimal password-based authennticated key exchangge [M ] . Theory of Cryyptography . 2011 : 293 - 310 .
0
浏览量
1167
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构