[1]蔡庆玲,詹宜巨,刘洋,等.通用可组合安全的匿名认证密钥交换协议[J].深圳大学学报理工版,2010,27(4):402-407.
 CAI Qing-ling,ZHAN Yi-ju,LIU Yang,et al.Anonymous authentication key exchange protocol with universally composable security[J].Journal of Shenzhen University Science and Engineering,2010,27(4):402-407.
点击复制

通用可组合安全的匿名认证密钥交换协议()
分享到:

《深圳大学学报理工版》[ISSN:1000-2618/CN:44-1401/N]

卷:
第27卷
期数:
2010年4期
页码:
402-407
栏目:
光电与信息工程
出版日期:
2010-10-31

文章信息/Info

Title:
Anonymous authentication key exchange protocol with universally composable security
文章编号:
1000-2618(2010)04-0402-06
作者:
蔡庆玲1詹宜巨1刘洋2唐焯宜2
1)中山大学工学院,广州 510275
2)中山大学信息科学与技术学院,广州 510275
Author(s):
CAI Qing-ling1ZHAN Yi-ju1LIU Yang2and TANG Zhuo-yi2
1)School of Engineering, Sun Yat-sen University, Guangzhou 510275, P.R.China
2)School of Information Science and Technology Sun Yat-sen University, Guangzhou 510275, P.R.China
关键词:
通信技术 信息安全 远程身份认证 密钥交换协议 会话密钥 通用可组合安全 口令认证
Keywords:
communication technologyinformation securityremote entity authenticationkey exchangesession keyuniversally composable securitypassword authentication
分类号:
TN 918.91
文献标志码:
A
摘要:
针对智能卡登录系统中远程身份认证和密钥交换问题,提出一种具有通用可组合安全的基于口令的匿名认证密钥交换协议——πpAKE.该协议采用匿名技术进行登录认证及信息存储管理,使用Diffie-Hellman(DH)算法实现数据交换,同时生成临时会话密钥.由此节省了登录的运算开销,且协议具有前向安全性.研究从形式化论证角度出发,利用通用可组合安全认证理想函数FAUTH模型和密钥交换理想函数FKE模型,构建πpAKE的通用可组合安全模型,并在此模型下,对πpAKE安全性进行论证,结果表明,该协议具有通用可组合的安全性能.
Abstract:
Focusing on remote entity authentication and key exchange with smart cards,this paper proposed a password-based anonymous authentication key exchange protocol with universally composabe security——πpAKE.In this protocol the anonymous technology was used for login,authentication and management of information storage.Diffie-Hellman(DH) algorithm was in troduced to realize the data exchange and generates the session key so as to reduce the computational cost when login.The protocol has forward security.For the purpose of formalization,this paper established an universally-composable security model for πpAKE based on the model of ideal function for authentication FAUTH and key exchange FKE,and demonstrated the security of πpAKE under the model.The verification results have demonstrated the universally composable security of this sprotocol.

参考文献/References:

[1]Lee Sung-woon,Kim Hyun-sung,Yoo Kee-young.一种对Chien等人的智能卡远程用户认证方法的改进[J].计算机标准与接口,2005,27(2):181-183.(英文版)
[2]Lee Narn-yih,Chiu Yu-chung.智能卡远程用户认证改进算法[J].计算机标准与接口,2005,27(2):177-180.(英文版)
[3]Sherman S M Chow,Kim-Kwang Raymond Choo.一种强安全的基于身份的密钥协议及匿名扩展[G]//计算机科学讲义:信息安全.柏林:施普林格,2007:203-220 (英文版)
[4]胡荣磊,刘建伟,张其善.对一种远程用户口令认证方案的改进[J].北京航空航天大学学报,2008,34(9):1037-1040.
[5]冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756.
[6]杜红珍,温巧燕.基于身份多接收者签密双线性对方案[J].圳大学学报理工版,2009,26(2):128-131.
[7]徐鹏,崔国华,雷凤宇,等.标准模型下一种实用的和可证明安全的IBE方案[J].计算机学报,2010,33(2):335-344.
[8]张席,陈泯融,刘浩.无需随机预言模型的基于身份门限解密方[J].深圳大学学报理工版,2010,27(3):340-346.
[9]张帆,孙璇,马建峰,等.供应链环境下通用可组合安全的RFId通信协议[J].计算机学报,2008,31(10):1754-1767.
[10]Ran Canetti,Shai Halevi,Jonathan Katz,等.通用可组合安全的基于口令的密钥交换协议[C]// EUROCRYPT′05,LNCS.哥本哈根:施普林格,2005:404-421.(英文版)
[11]Ran canetti.通用可组合安全的签名、凭证和认证[C]//第17届美国电气电子工程师学会计算机安全基础讨论会(CSFW).美国:美国电气电子工程师学会,2004:219-245.(英文版)



[1]Lee Sung-woon,Kim Hyun-sung,Yoo Kee-young.Improvement of Chien et al.’s remote user authentication scheme using smart cards[J].Computer Standards & Interfaces,2005,27(2):181-183.
[2]Lee Narn-yih,Chiu Yu-chung.Improved remote authentication scheme with smart card[J].Computer Standards & Interfaces,2005,27(2):177-180.
[3]Sherman S M Chow,Kim-Kwang Raymond Choo.Strongly-secure identity-based key agreement and anonymous extension[G]//Lecture Notes in Computer Sciences:Information Security.Berlin:Springer-Verlag,2007,4779:203-220.
[4]HU Rong-lei,LIU Jian-wei,ZHANG Qi-shan.Improvement of remote user authentication schemes using passwords[J].Journal of Beijing University of Aeronautics and Astronautics,2008,34(9):1037-1040.(in Chinese)
[5]FENG Deng-guo.Research on theory and approach of provable security[J].Journal of Software,2005,16(10):1743-1756.(in Chinese)
[6]DU Hong-zhen,WEN Qiao-yan. An efficient identity-based multi-recipient signcryption scheme[J].Journal of Shenzhen University Science and Engineering,2009,26(2):128-131. (in Chinese)
[7]XU Peng,CUI Guo-hua,LEI Feng-yu,et al.An efficient and provably secure IBE scheme under the standard model[J].Chinese Journal of Computers,2010,33(2):335-344.(in Chinese)
[8]ZHANG Xi,CHEN Min-rong,LIU Hao. Practical identity-based threshold decryption scheme without random oracle[J]. JournalofShenzhenUniversityScienceandEngineering,2010,27(3):340-346. (in Chinese)
[9]ZHANG Fan,SUN Xuan,MA Jian-feng,et al.A universally composable secure RFId communication protocol in supply chains[J].Chinese Journal of Computers,2008,31(10):1754-1767.(in Chinese)
[10]Ran Canetti,Shai Halevi,Jonathan Katz,et al.Universally composable password-based key exchange[C]// EUROCRYPT′05,LNCS.Copenhagen:Springer-Verlag,2005,3494:404-421.
[11]Ran canetti.Universally composable signature,certification and authentication[C]// 17th IEEE Computer Security Foundations Workshop(CSFW).NY:IEEE Computer Society Press,2004:219-245.

相似文献/References:

[1]郭尊华,谢维信,黄敬雄.传感器网络有线接入信息传输性能分析[J].深圳大学学报理工版,2010,27(1):1.
 GUO Zun-hua,XIE Wei-xin,and HUANG Jing-xiong.Performance analysis of sensors transmitting data with wired access scheme[J].Journal of Shenzhen University Science and Engineering,2010,27(4):1.
[2]解武,曹家年,刘世航,等.IEEE 802.15.4a信道对UWB功率谱影响分析[J].深圳大学学报理工版,2010,27(1):43.
 XIE Wu,CAO Jia-nian,LIU Shi-hang,et al.Power spectrum density of UWB signals in IEEE 802.15.4a[J].Journal of Shenzhen University Science and Engineering,2010,27(4):43.
[3]曾捷,陆清,王晖.基于格形图预测的WCDMA功率控制算法[J].深圳大学学报理工版,2010,27(1):56.
 ZENG Jie,LU Qing,and WANG Hui.Trellis-based prediction simulation algorithm for power control in WCDMA system[J].Journal of Shenzhen University Science and Engineering,2010,27(4):56.
[4]薛睿,赵旦峰,肖春丽.基于Turbo迭代算法的LDPCC-CPM系统接收机设计[J].深圳大学学报理工版,2010,27(3):301.
 XUE Rui,ZHAO Dan-feng,and XIAO Chun-li.Design of a receiver for LDPCC-CPM system based on Turbo principle[J].Journal of Shenzhen University Science and Engineering,2010,27(4):301.
[5]邹卫霞,冯璐,李斌,等.UWB对WiMAX系统的电磁干扰分析[J].深圳大学学报理工版,2010,27(3):306.
 ZOU Wei-xia,FENG Lu,LI Bin,et al.Coexistence between UWB and WiMAX system[J].Journal of Shenzhen University Science and Engineering,2010,27(4):306.
[6]曲家庆,张曙.延长传感器网络寿命的动态休眠调度算法[J].深圳大学学报理工版,2010,27(4):396.
 QU Jia-qing and ZHANG Shu.A dynamic sleeping scheduling algorithm for prolonging the lifetime of wireless sensor networks[J].Journal of Shenzhen University Science and Engineering,2010,27(4):396.
[7]陈彬,张胜利,程凌浩,等.基于幅度估计的光相干检测增强方法[J].深圳大学学报理工版,2011,28(No.2(095-188)):161.
 CHEN Bin,ZHANG Sheng-li,CHENG Ling-hao,et al.The enhancement of optical coherent detection by amplitude estimation[J].Journal of Shenzhen University Science and Engineering,2011,28(4):161.
[8]赵春晖,马爽,成宝芝.基于特征值矩阵的循环平稳检测算法[J].深圳大学学报理工版,2012,29(No.2(095-188)):107.[doi:10.3724/SP.J.1249.2012.02107]
 ZHAO Chun-hui,MA Shuang,and CHENG Bao-zhi.Cyclostationary spectrum sensing algorithm based on eigenvalues matrix[J].Journal of Shenzhen University Science and Engineering,2012,29(4):107.[doi:10.3724/SP.J.1249.2012.02107]
[9]刁玉平,廖铭,刁永平.互联网自治域名体系的构造及其自主性研究[J].深圳大学学报理工版,2012,29(No.4(283-376)):347.[doi:10.3724/SP.J.1249.2012.04347]
 DIAO Yu-ping,LIAO Ming,and DIAO Yong-ping.Internet autonomous DNS architecture construction and research[J].Journal of Shenzhen University Science and Engineering,2012,29(4):347.[doi:10.3724/SP.J.1249.2012.04347]
[10]柴广跃,刘强,徐光辉,等.基于同轴结构的高速VCSEL管座设计方法[J].深圳大学学报理工版,2014,31(5):493.[doi:10.3724/SP.J.1249.2014.05493]
 Chai Guangyue,Liu Qiang,Xu Guanghui,et al.An optimized design based on coaxial packaging of the high speed VCSEL[J].Journal of Shenzhen University Science and Engineering,2014,31(4):493.[doi:10.3724/SP.J.1249.2014.05493]

备注/Memo

备注/Memo:
收稿日期:2010-05-10;修回日期:2010-10-06
基金项目:国家自然科学基金资助项目(61071038);广东省自然科学基金资助项目(9151027501000076)
作者简介:蔡庆玲(1966-),女(汉族),安徽省合肥市人,中山大学讲师、博士.E-mail:caiqingl@mail.sysu.edu.cn
通讯作者:詹宜巨(1955-),男(汉族),中山大学教授、博士生导师.E-mail:zhanyiju@mail.sysu.edu.cn
更新日期/Last Update: 2010-11-08