通信学报 ›› 2012, Vol. 33 ›› Issue (12): 108-115.doi: 10.3969/j.issn.1000-436x.2012.12.014

• 技术报告 • 上一篇    下一篇

可证明安全的智能移动终端私钥保护方案

马骏1,2,马建峰1,郭渊博2   

  1. 1 西安电子科技大学 计算机网络与信息安全教育部重点实验室,陕西 西安 710071
    2 解放军信息工程大学 电子技术学院,河南 郑州 450004
  • 出版日期:2012-12-25 发布日期:2017-07-15
  • 基金资助:
    长江学者和创新团队发展计划基金资助项目;国家自然基金委员会——广东联合基金重点基金资助项目;国家科技部重大专项基金资助项目;河南省科技创新杰出青年计划基金资助项目

Provably secure private key protection scheme for smart mobile terminal

Jun MA1,2,Jian-feng MA1,Yuan-bo GUO2   

  1. 1 Key Laboratory of Computer Networks and Informatio urity(Ministry of Education),Xidian University,Xi’an 710071,China
    2 Institute of Electronic Technique,PLA Information Engineering University,Zhengzhou 450004,China
  • Online:2012-12-25 Published:2017-07-15
  • Supported by:
    The Program for Changjiang Scholars and Innovative Research Team in University;The Key Program of NSFC-Guangdong Union Foundation;The Major National S&T Program

摘要:

摘 要:提出一种可证明安全的智能移动终端私钥保护方案。充分利用口令保护、密钥分割与服务器动态交互获取部分私钥等技术保证用户私钥安全。与其他方案相比,该方案的优势在于:减少了智能移动终端的计算量和存储量,简化了交互过程参数的设置;将时间同步贯穿整个方案的设计过程,防止重放攻击的同时,更提供了便捷高效的用户私钥失效方案。方案达到了安全私钥获取和高效私钥失效的效果,符合智能移动终端的安全应用需求,在随机预言机模型下是可证明安全的。

关键词: 私钥保护, 可证明安全, 随机预言机模型

Abstract:

A provable security scheme for private key protection of smart mobile terminal (SMT) was presented.In the scheme a improved security mechanism is incorporated,which includes password protection,key division and partial key retrieval from server of strong computing capability in order to protect private key security.Compared with previous proposals,the scheme has the following advantages.It reduces computation amount and storage of SMT,and simplifies parameter setting for interaction processes.It takes time synchronization between SMT and server into account.The latter characteristic not only provides better protection of scheme from replay attacks,but also offers a highly efficient mechanism of user private key disabling,and avoiding complex operation of user and extra storage of other device.The investigation has indicated that improved private key protection to SMT can be well achieved with this scheme.The scheme has also been proved to provide satisfactory security in the random oracle model.

Key words: private key protection, provable security, random oracle model

No Suggested Reading articles found!