上海交通大学学报(英文版) ›› 2014, Vol. 19 ›› Issue (4): 436-439.doi: 10.1007/s12204-014-1521-7
CHIEN Hung-yu (简宏宇)
出版日期:
2014-08-30
发布日期:
2014-10-13
通讯作者:
CHIEN Hung-yu (简宏宇)
E-mail: hychien@ncnu.edu.tw
CHIEN Hung-yu (简宏宇)
Online:
2014-08-30
Published:
2014-10-13
Contact:
CHIEN Hung-yu (简宏宇)
E-mail: hychien@ncnu.edu.tw
摘要: Authenticated Diffie-Hellman key agreement is quite popular for establishing secure session keys. As resource-limited mobile devices are becoming more popular and security threats are increasing, it is desirable to reduce computational load for these resource-limited devices while still preserving its strong security and convenience for users. In this paper, we propose a new smart-card-based user authenticated key agreement scheme which allows users to memorize passwords, reduces users’ device computational load while still preserves its strong security. The proposed scheme effectively improves the computational load of modular exponentiations by 50%, and the security is formally proved.
中图分类号:
CHIEN Hung-yu (简宏宇). Provably Secure Authenticated Diffie-Hellman Key Exchange for Resource-Limited Smart Card[J]. 上海交通大学学报(英文版), 2014, 19(4): 436-439.
CHIEN Hung-yu (简宏宇). Provably Secure Authenticated Diffie-Hellman Key Exchange for Resource-Limited Smart Card[J]. Journal of shanghai Jiaotong University (Science), 2014, 19(4): 436-439.
[1] Sandirigama M, Shimizu A, Noda M T. Simple and secure password authentication protocol (SAS) [J].IEICE Transactions on Communications, 2000, E83-B(6): 1363-1365.[2] Chien H Y, Jan J K, Tseng Y M. A modified remote login authentication scheme based on geometric approach [J]. The Journal of Systems and Software,2001, 55: 287-290.[3] Sun H M, Li L H. An efficient remote user authentication scheme using smart cards [J]. IEEE Transactions on Consumer Electronics, 2000, 46(4): 958-961.[4] Wu T C. Remote login authentication scheme based on a geometric approach [J]. Computer Communications,1995, 18(12): 959-963.[5] Hwang M S. Cryptanalysis of a remote login authentication scheme [J]. Computer Communications, 1999,22(8): 742-744.[6] Bellare M, Canetti R, Krawczyk H. A modular approach to the design and analysis of authentication and key exchange protocols [C]//Proceedings of 30th Annual Symposium on the Theory of Computing. New York, USA: ACM, 1998: 419-428.[7] Bellare M, Pointcheval D, Rogaway P. Authenticated key exchange secure against dictionary attacks [J]. Lecture Notes in Computer Science, 2000, 1807:139-155.[8] Ding Y, Horster P. Undetectable on-line password guessing attacks [J]. ACM Operating Systems Review,1995, 29(4): 77-86.[9] Brusilovsky A, Faynberg I, Zeltsan Z, et al. RFC683-password-authenticated key (PAK)Diffie-Hellman exchange [EB/OL]. (2013-10-30).http://tools.ietf.org/ html/rfc5683.[10] Boyko V, Mackenzie P, Patel S. Provably secure password authenticated key exchange using Diffie-Hellman [J]. Lecture Notes in Computer Science, 2000,1807: 156-171.[11] Kwon T. Authentication and key agreement via memorable password [C]// Proceedings of the ISOC Network and Distributed System Security Symposium.[s.l.]: International Association for Cryptologic Research,2001: 1-13.[12] Kwon T. Practical authenticated key agreement using passwords [J]. Lecture Notes in Computer Science,2004, 3225: 1-12.[13] IEEE. P1363.2 standard specifications for passwordbased public key cryptographic techniques [EB/OL].http://grouper.ieee.org/groups/1363/december 2002. |
[1] | GUO Fei (郭非), CAO Zhenfu (曹珍富), LIU Zhusen (刘竹森), CAO Nanyuan (曹楠源). A Privacy-Preserving Aggregation and Authentication Scheme Towards Mobile Users in Smart Grid[J]. Journal of Shanghai Jiao Tong University (Science), 2020, 25(1): 37-43. |
[2] | MIRZAEE Siavash, JIANG Letian *(蒋乐天). Fast Confidentiality-Preserving Authentication for Vehicular Ad Hoc Networks[J]. Journal of Shanghai Jiao Tong University (Science), 2019, 24(1): 31-40. |
[3] | HE Jing-sha1,2 (何泾沙), XU Chen1* (徐琛), ZHANG Yi-xuan1 (张伊璇), ZHOU Shi-yi2 (周世义). A Strategy for Middleman Attack Prevention in Remote Desktop Protocol[J]. 上海交通大学学报(英文版), 2015, 20(1): 82-85. |
[4] | HUANG Jheng-jia1 (黄政嘉), LU Pei-chun2 (卢佩君), JUANG Wen-shenq2* (庄文胜), FAN Chun-i1. Secure and Efficient Digital Rights Management Mechanisms with Privacy Protection[J]. 上海交通大学学报(英文版), 2014, 19(4): 443-447. |
[5] | XIE Qi* (谢 琪), LIU Wen-hao (刘文浩), WANG Sheng-bao (王圣宝),HU Bin (胡 斌), DONG Na (董 . Robust Password and Smart Card Based Authentication Scheme with Smart Card Revocation[J]. 上海交通大学学报(英文版), 2014, 19(4): 418-424. |
[6] | XU Yi-dong* (许一栋), LIU Sheng-li (刘胜利). One Construction of Chameleon All-But-One Trapdoor Functions[J]. 上海交通大学学报(英文版), 2014, 19(4): 412-417. |
[7] | WANG Liang-liang1* (王亮亮), CHEN Ke-fei2 (陈克非),MAO Xian-ping1 (毛贤平), WANG Yong-tao. Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing[J]. 上海交通大学学报(英文版), 2014, 19(4): 398-405. |
[8] | CHIEN Hung-yu (简宏宇), YEH Ming-kuei (叶明贵), WU Tzong-chen (吴宗成), LEE Chin. Comments on Enhanced Yoking Proof Protocols for Radio Frequency Identification Tags and Tag Groups[J]. 上海交通大学学报(英文版), 2011, 16(5): 604-609. |
[9] | LO Nai-wei (罗乃维), YEH Kuo-hui (叶国晖). Simple Three-Party Password Authenticated Key Exchange Protocol[J]. 上海交通大学学报(英文版), 2011, 16(5): 600-603. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||