基于CDH假设的eck安全认证密钥协议

Mengzhi Liu, Yanli Zhao, Shuying Chen
{"title":"基于CDH假设的eck安全认证密钥协议","authors":"Mengzhi Liu, Yanli Zhao, Shuying Chen","doi":"10.1109/COMPCOMM.2016.7924695","DOIUrl":null,"url":null,"abstract":"By far, the extended Canetti-Krawczyk (eCK) model still is one of strongest security model for authenticated key exchange (AKE) protocols. In this paper, a secure authenticated key agreement protocol named SAKA is analyzed in the model, the results show that the SAKA protocol does not support forward security which all key exchange protocol should satisfy. Furthermore, it does not meet security goals of the eCK model. In order to overcome all of above flaws, a variant of SAKA protocol is proposed based on Computation Diffie-Hellman assumption, and secure analysis shows that the new protocol has some good security properties including perfect forward secrecy and known session key excepting those desired security properties that SAKA has. Furthermore, fewer number of modular exponentiation indicates that the new scheme is more efficient.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"eCK-security authenticated key agreement protocol based on CDH assumption\",\"authors\":\"Mengzhi Liu, Yanli Zhao, Shuying Chen\",\"doi\":\"10.1109/COMPCOMM.2016.7924695\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"By far, the extended Canetti-Krawczyk (eCK) model still is one of strongest security model for authenticated key exchange (AKE) protocols. In this paper, a secure authenticated key agreement protocol named SAKA is analyzed in the model, the results show that the SAKA protocol does not support forward security which all key exchange protocol should satisfy. Furthermore, it does not meet security goals of the eCK model. In order to overcome all of above flaws, a variant of SAKA protocol is proposed based on Computation Diffie-Hellman assumption, and secure analysis shows that the new protocol has some good security properties including perfect forward secrecy and known session key excepting those desired security properties that SAKA has. Furthermore, fewer number of modular exponentiation indicates that the new scheme is more efficient.\",\"PeriodicalId\":210833,\"journal\":{\"name\":\"2016 2nd IEEE International Conference on Computer and Communications (ICCC)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 2nd IEEE International Conference on Computer and Communications (ICCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMPCOMM.2016.7924695\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMPCOMM.2016.7924695","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

迄今为止,扩展的Canetti-Krawczyk (eCK)模型仍然是身份验证密钥交换(AKE)协议中最强的安全模型之一。本文在模型中对安全认证密钥协议SAKA进行了分析,结果表明SAKA协议不支持所有密钥交换协议都应满足的前向安全性。此外,它不符合eCK模型的安全目标。为了克服上述缺陷,提出了一种基于计算Diffie-Hellman假设的SAKA协议的变体,安全分析表明,新协议具有SAKA所具有的完美前向保密和会话密钥已知等良好的安全特性。此外,较少的模幂次表明新方案的效率更高。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
eCK-security authenticated key agreement protocol based on CDH assumption
By far, the extended Canetti-Krawczyk (eCK) model still is one of strongest security model for authenticated key exchange (AKE) protocols. In this paper, a secure authenticated key agreement protocol named SAKA is analyzed in the model, the results show that the SAKA protocol does not support forward security which all key exchange protocol should satisfy. Furthermore, it does not meet security goals of the eCK model. In order to overcome all of above flaws, a variant of SAKA protocol is proposed based on Computation Diffie-Hellman assumption, and secure analysis shows that the new protocol has some good security properties including perfect forward secrecy and known session key excepting those desired security properties that SAKA has. Furthermore, fewer number of modular exponentiation indicates that the new scheme is more efficient.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Secure routing in IoT with multi-objective simulated annealing Modeling of TCM packing robot and its kinematics simulation and optimization Iterative decision-directed channel estimation for MIMO-OFDM system A systemic performance evaluation method for Residue Number System A dynamic hierarchical quotient topology model based optimal path finding algorithm in complex networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1