• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2014, Vol. 36 ›› Issue (07): 1284-1289.

• 论文 • 上一篇    下一篇

适用于双方频繁通信的密钥交换协议

易通1,李学宝2,陈宏朝1   

  1. (1.广西师范大学计算机科学与信息工程学院,广西 桂林 541004;
    2.包头师范学院信息科学与技术学院,内蒙古 包头 014030)
  • 收稿日期:2013-02-17 修回日期:2013-04-27 出版日期:2014-07-25 发布日期:2014-07-25
  • 基金资助:

    国家自然科学基金资助项目(61163025);内蒙古高等学校科学技术研究资助项目(NJZY12200);2013年广西研究生教育创新计划资助项目(YCSZ2013042)

A novel key exchange protocol
for frequent communication         

YI Tong1,LI Xuebao2,CHEN Hongchao1   

  1. (1.College of Computer Science & Information Engineering,Guangxi Normal University,Guilin 541004;
    2.School of Information Science and Technology,Baotou Normal University,Baotou 014030,China)
  • Received:2013-02-17 Revised:2013-04-27 Online:2014-07-25 Published:2014-07-25

摘要:

首先对以前提出的一个高效的基于验证元的三方密钥交换协议进行了安全性分析,指出了它容易受到服务器密钥泄露攻击等安全威胁,且缺乏前向安全性;并以此为基础,针对大多数现存的基于验证元的3PAKE协议均难以抵御服务器密钥泄露攻击的现状,提出了一个新的3PAKE协议。通过安全性分析,证明了新协议比原协议更安全,能够抵御各种已知的攻击,且与现有的大多数同类协议相比具有更高的效率。

关键词: 基于验证元, 三方密钥交换协议, 服务器密钥泄露攻击, 会话密钥, 前向安全性

Abstract:

Firstly, an efficient verifierbased threeparty passwordauthenticated key exchange protocol previously proposed is analyzed. The protocol is vulnerable to security threats such as server key disclosure attack and so on, and has a lack of forward secrecy. Secondly, on the basis of the analysis, in order to solve the problem that most of existing verifierbased 3PAKE protocols cannot resist server key disclosure attack, a novel 3PAKE protocol is proposed. Through security analysis, the new protocol can be proved to be more secure than the old one, and has the ability to resist all known attacks. In addition, compared with existing protocols, it is more efficient.

Key words: verifier-based;password-authenticated key exchange protocol for three-party;server key disclosure attack;session key;forward secrecy