浏览全部资源
扫码关注微信
1. 北京电子科技学院密码科学与技术系,北京 100070
2. 密码科学技术国家重点实验室,北京 100878
3. 数据通信科学技术研究所系统安全部,北京 100191
[ "张艳硕(1979– ),男,陕西宝鸡人,博士,北京电子科技学院副教授,主要研究方向为密码理论及其应用" ]
[ "王泽豪(1994- ),男,河南新乡人,数据通信科学技术研究所助理工程师,主要研究方向为信息隐藏技术及其应用" ]
[ "王志强(1984– ),男,安徽宿州人,博士,北京电子科技学院讲师,主要研究方向为密码技术及其应用" ]
[ "陈辉焱(1968– ),男,山东菏泽人,博士,北京电子科技学院研究员级高级工程师,主要研究方向为公钥密码" ]
网络出版日期:2019-12,
纸质出版日期:2019-12-25
移动端阅览
张艳硕, 王泽豪, 王志强, 等. 基于特征值的可验证三方安全密钥交换协议[J]. 通信学报, 2019,40(12):149-154.
Yanshuo ZHANG, Zehao WANG, Zhiqiang WANG, et al. Verifiable three-party secure key exchange protocol based on eigenvalue[J]. Journal on communications, 2019, 40(12): 149-154.
张艳硕, 王泽豪, 王志强, 等. 基于特征值的可验证三方安全密钥交换协议[J]. 通信学报, 2019,40(12):149-154. DOI: 10.11959/j.issn.1000-436x.2019233.
Yanshuo ZHANG, Zehao WANG, Zhiqiang WANG, et al. Verifiable three-party secure key exchange protocol based on eigenvalue[J]. Journal on communications, 2019, 40(12): 149-154. DOI: 10.11959/j.issn.1000-436x.2019233.
为解决传统密钥交换协议无法进行三方密钥协商,不够灵活且安全性存在缺陷的问题,借助于秘密矩阵特征值,首先提出了一种可以抵御中间人攻击且简单灵活的三方密钥交换方案,但该方案无法对密钥交换的有效性进行验证,即无法防止不被中间人伪造。在此基础上,对秘密矩阵进行重新构建,其中矩阵阶数为大偶数,所有的特征值成对出现,相似于对角阵。基于所提的特殊秘密矩阵,引入验证环节对通信方的合法性进行验证,给出了基于特征值的可验证三方密钥交换协议。该协议既解决了三方密钥交换的问题,又可对身份合法性进行验证,证明基于特征值进行三方密钥交换协议设计是可行的,最终设计的协议兼具安全性和高效性。
In order to solve the problem that the traditional key exchange protocol
which was not flexible enough and flawed in security
cannot provide the function of three-party key negotiation
firstly
a simple and flexible three-party key exchange scheme that can resist man-in-the-middle attacks was proposed with the help of secret matrix eigenvalues.However
the validity of key exchange cannot be verified by the scheme
and counterfeiting by middlemen can’t be prevented.Then based on it
the secret matrix was reconstructed
where the matrix order was a large even number
and all the eigenvalues appeared in pairs
similar to the diagonal matrix.Based on the special secret matrix
the verification part which can be used to verify the legitimacy of the communication party was introduced to the scheme
and the verifiable three-party key exchange protocol based on the eigenvalue was given.The protocol not only solved the problem of three-party key exchange
but also verified identity legitimacy.It is proved that it’s feasible to design a three-party key exchange protocol by the eigenvalue.The final protocol is both secure and efficient.
ZHANG W , WANG F Y . The GRE over IPsec VPN research and implementation of combining with the construction scheme of NAT [J ] . Journal of Shandong University of Technology , 2017 ( 3 ): 87 - 90 .
ZAGHAL R , SALAH S , JABALI N . Extending AES with DH key-exchange to enhance VoIP encryption in mobile networks [C ] // World Conference on Information Systems and Technologies . IEEE , 2018 : 435 - 462 .
LI C T , CHEN C L , LEE C C , et al . A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps [J ] . Soft Computing , 2017 ( 6 ): 1 - 12 .
FARASH M S , ATTARI M A . An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps [J ] . Nonlinear Dynamics , 2014 , 77 ( 1-2 ): 399 - 411 .
WANG X , ZHAO J . An improved key agreement protocol based on chaos [J ] . Communications in Nonlinear Science and Numerical Simulation , 2010 , 15 ( 12 ): 4052 - 4057 .
叶茂 , 胡学先 , 刘文芬 . 基于格的三方口令认证密钥交换协议 [J ] . 电子与信息学报 , 2013 , 35 ( 6 ): 1376 - 1381 .
YE M , HU X X , LIU W F . Password authenticated key exchange protocol in the three party setting based on lattices [J ] . Journal of Electronics and Information Technology , 2013 , 35 ( 6 ): 1376 - 1381 .
王元元 . 三方认证密钥交换协议研究 [D ] . 上海:上海交通大学 , 2010 .
WANG Y Y . Research on three-party authenticated key exchange protocol [D ] . Shanghai:Shanghai Jiao Tong University , 2010 .
林远辉 . 基于口令的三方认证密钥交换协议研究 [D ] . 济南:山东大学 , 2014 .
LIN Y H . Research on three-party authentication key exchange protocol based on password [D ] . Jinan:Shandong University , 2014 .
YOON E J , JEON I S . An efficient and secure Diffie–Hellman key agreement protocol based on Chebyshev chaotic map [J ] . Communications in Nonlinear Science and Numerical Simulation , 2011 , 16 ( 6 ): 2383 - 2389 .
ZHAO F , GONG P , LI S , et al . Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials [J ] . Nonlinear Dynamics , 2013 , 74 ( 1-2 ): 419 - 427 .
LIN T H , LEE T F . Secure verifier-based three-party authentication schemes without server public keys for data exchange in telecare medicine information systems [J ] . Journal of Medical Systems , 2014 , 38 ( 5 ):30.
LV C , MA M , LI H , et al . An novel three-party authenticated key exchange protocol using one-time key [J ] . Journal of Network and Computer Applications , 2013 , 36 ( 1 ): 498 - 503 .
DIFFIE W , HELLMAN M . New directions in cryptography [J ] . IEEE Transactions on Information Theory , 1976 , 22 ( 6 ): 644 - 654 .
KODALI R K , NAIKOTI A . ECDH based security model for IoT using ESP8266 [C ] // International Conference on Control,Instrumentation,Communication and Computational Technologies . IEEE , 2017 : 629 - 633 .
DING J , ALSAYIGH S , LANCRENON J , et al . Provably secure password authenticated key exchange based on RLWE for the post-quantum world [C ] // Cryptographers’ Track at the RSA Conference . Springer International Publishing , 2017 : 183 - 204 .
MATSUMOTO T . On seeking smart public-key distribution systems [J ] . IEICE Trans Fundamental , 1986 , 69 ( 2 ): 224 - 231 .
ZHANG L , WU Q , DOMINGO-FERRER J , et al . Round-efficient and sender-unrestricted dynamic group key agreement protocol for secure group communications [J ] . IEEE Transactions on Information Forensics & Security , 2017 , 10 ( 11 ): 2352 - 2364 .
LENZ J , MUBAYI D . Eigenvalues of non-regular linear quasirandom hypergraphs [J ] . Discrete Mathematics , 2017 , 340 ( 2 ): 145 - 153 .
0
浏览量
643
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构