通信学报 ›› 2018, Vol. 39 ›› Issue (11): 87-97.doi: 10.11959/j.issn.1000-436x.2018237

• 学术论文 • 上一篇    下一篇

格上基于口令的三方认证密钥交换协议

于金霞,廉欢欢,汤永利,史梦瑶,赵宗渠()   

  1. 河南理工大学计算机科学与技术学院,河南 焦作 454000
  • 修回日期:2018-06-09 出版日期:2018-11-01 发布日期:2018-12-10
  • 作者简介:于金霞(1974–),女,河南博爱人,博士,河南理工大学教授,主要研究方向为人工智能、信息安全。|廉欢欢(1993–),女,河南沁阳人,河南理工大学硕士生,主要研究方向为信息安全、密码学。|汤永利 (1972-),男,河南孟州人,博士,河南理 工大学教授、硕士生导师,主要研究方向为信息安全、密码学。|史梦瑶(1998–),女,河南许昌人,河南理工大 学硕士生,主要研究方向为信息安全、密码学。|赵宗渠(1974–),男,河南沁阳人, 博士,河南理工大学讲师,主要研究方向为密码学、网络安全、恶意代码分析。
  • 基金资助:
    国家密码管理局“十三五”国家密码发展基金资助项目(MMJJ20170122);河南省科技厅基金资助项目(142300410147);河南省教育厅基金资助项目(16A520013);河南理工大学博士基金资助项目(B2014-044);河南理工大学博士基金资助项目(B2016-39);河南理工大学自然科学基金资助项目(T2018-1)

Password-based three-party authenticated key exchange protocol from lattices

Jinxia YU,Huanhuan LIAN,Yongli TANG,Mengyao SHI,Zongqu ZHAO()   

  1. College of Computer Science and Technology,Henan Polytechnic University,Jiaozuo 454000,China
  • Revised:2018-06-09 Online:2018-11-01 Published:2018-12-10
  • Supported by:
    The “13th Five-Year” National Crypto Development Foundation(MMJJ20170122);The Project of Science and Technology Department of Henan Province(142300410147);The Project of Education Department of Henan Province(16A520013);The Doctoral Fund of Henan Polytechnic University(B2014-044);The Doctoral Fund of Henan Polytechnic University(B2016-39);The Natural Science Foundation of Henan Polytechnic University(T2018-1)

摘要:

三方口令认证密钥交换协议允许用户通过一个服务器在不安全的信道中建立一个受保护的会话密钥,而现有的格上PAKE协议绝大多数都是针对两方设计的,无法适用于大规模的通信系统。基于此,提出一种新的格上三方PAKE协议,该协议主要以可拆分公钥加密体制及其相应的近似平滑投射散列函数为基础进行构造,并通过在协议中引入消息认证机制的方式来防止消息重放攻击。与同类协议相比,所提协议减少了通信轮数,提高了效率和协议应用的安全性。

关键词: 三方密钥交换, 口令认证, LWE问题, 可证安全性

Abstract:

Password-based three-party authenticated key exchange protocol allow clients to establish a protected session key through a server over insecure channels.Most of the existing PAKE protocols on lattices were designed for the two parties,which could not be applied to large-scale communication systems,so a novel three-party PAKE protocol from lattices was proposed.The PAKE protocol was constructed by using a splittable public-key encryption scheme and an associated approximate smooth projective Hash function,and message authentication mechanism was introduced in the protocol to resist replay attacks.Compared with the similar protocols,the new protocol reduces the number of communication round and improves the efficiency and the security of protocol applications.

Key words: three-party key exchange, password authentication, LWE problem, provable security

中图分类号: 

No Suggested Reading articles found!