Journal on Communications ›› 2022, Vol. 43 ›› Issue (4): 95-106.doi: 10.11959/j.issn.1000-436x.2022062
• Papers • Previous Articles Next Articles
Huanhuan LIAN1, Huiying HOU1, Yunlei ZHAO1,2
Revised:
2021-12-17
Online:
2022-04-25
Published:
2022-04-01
Supported by:
CLC Number:
Huanhuan LIAN, Huiying HOU, Yunlei ZHAO. Post-quantum verifier-based three-party password authenticated key exchange protocol[J]. Journal on Communications, 2022, 43(4): 95-106.
[1] | BELLOVIN S M , MERRITT M . Encrypted key exchange:password-based protocols secure against dictionary attacks[C]// Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy. Piscataway:IEEE Press, 1992: 72-84. |
[2] | VASCO M I G , POZO A L P D , SORIENTE C . A key for John Doe:modeling and designing anonymous password-authenticated key exchange protocols[J]. IEEE Transactions on Dependable and Secure Computing, 2021,18(3): 1336-1353. |
[3] | BRADLEY T , JARECKI S , XU J . Strong asymmetric PAKE based on trapdoor CKEM[C]// 2019 Advances in Cryptology. Berlin:Springer, 2019: 798-825. |
[4] | ABDALLA M , BARBOSA M , BRADLEY T ,et al. Universally composable relaxed password authenticated key exchange[C]// 2020 Advances in Cryptology. Berlin:Springer, 2020: 278-307. |
[5] | KATZ J , VAIKUNTANATHAN V . Round-optimal password-based authenticated key exchange[J]. Journal of Cryptology, 2013,26(4): 714-743. |
[6] | KATZ J , VAIKUNTANATHAN V . Smooth projective hashing and password-based authenticated key exchange from lattices[C]// 2009 Advances in Cryptology. Berlin:Springer, 2009: 636-652. |
[7] | GENNARO R , LINDELL Y . A framework for password-based authenticated key exchange1[J]. ACM Transactions on Information and System Security (TISSEC), 2006,9(2): 181-234. |
[8] | DING Y , FAN L . Efficient password-based authenticated key exchange from lattices[C]// 2012 Seventh International Conference on Computational Intelligence and Security. Piscataway:IEEE Press, 2012: 934-938. |
[9] | GROCE A , KATZ J . A new framework for efficient password-based authenticated key exchange[C]// Proceedings of the 17th ACM conference on Computer and communications security. New York:ACM Press, 2010: 516-525. |
[10] | DING J , ALSAYIGH S , LANCRENON J ,et al. Provably secure password authenticated key exchange based on RLWE for the post-quantum world[C]// 2017 Cryptographers’ Track at the RSA Conference. Berlin:Springer, 2017: 183-204. |
[11] | ZHANG J , YU Y . Two-round PAKE from approximate SPH and instantiations from lattices[C]// 2017 International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2017: 37-67. |
[12] | 李子臣, 谢婷, 张卷美 . 基于RLWE问题的后量子口令认证密钥交换协议[J]. 电子学报, 2021,49(2): 260-267. |
LI Z C , XIE T , ZHANG J M . Post quantum password-based authentication key exchange protocol based on ring learning with errors problem[J]. Acta Electronica Sinica, 2021,49(2): 260-267. | |
[13] | YIN A Q , GUO Y B , SONG Y M ,et al. Two-round password-based authenticated key exchange from lattices[J]. Wireless Communications and Mobile Computing, 2020(17): 1-13. |
[14] | 叶茂, 胡学先, 刘文芬 . 基于格的三方口令认证密钥交换协议[J]. 电子与信息学报, 2013,35(6): 1376-1381. |
YE M , HU X X , LIU W F . Password authenticated key exchange protocol in the three party setting based on lattices[J]. Journal of Electronics & Information Technology, 2013,35(6): 1376-1381. | |
[15] | XU D Q , HE D B , CHOO K K R . Provably secure three-party password authenticated key exchange protocol based on ring learning with error[R]. 2017. |
[16] | 王彩芬, 陈丽 . 基于格的用户匿名三方口令认证密钥协商协议[J]. 通信学报, 2018,39(2): 21-30. |
WANG C F , CHEN L . Three-party password authenticated key agreement protocol with user anonymity based on lattice[J]. Journal on Communications, 2018,39(2): 21-30. | |
[17] | 于金霞, 廉欢欢, 汤永利 ,等. 格上基于口令的三方认证密钥交换协议[J]. 通信学报, 2018,39(11): 87-97. |
YU J X , LIAN H H , TANG Y L ,et al. Password-based three-party authenticated key exchange protocol from lattices[J]. Journal on Communications, 2018,39(11): 87-97. | |
[18] | JIANG S , GONG G , HE J ,et al. PAKEs:new framework,new techniques and more efficient lattice-based constructions in the standard model[C]// 2020 IACR International Conference on Public-Key Cryptography. Berlin:Springer, 2020: 396-427. |
[19] | BELLOVIN S M , MERRITT M . Augmented encrypted key exchange:a password-based protocol secure against dictionary attacks and password file compromise[C]// Proceedings of the 1st ACM conference on Computer and communications security. New York:ACM Press, 1993: 244-250. |
[20] | BENHAMOUDA F , POINTCHEVAL D . Verifier-based password-authenticated key exchange:new models and constructions[R]. 2014. |
[21] | 杨晓燕, 侯孟波, 魏晓超 . 基于验证元的三方口令认证密钥交换协议[J]. 计算机研究与发展, 2016,53(10): 2230-2238. |
YANG X Y , HOU M B , WEI X C . Verifier-based three-party password authenticated key exchange protocol[J]. Journal of Computer Research and Development, 2016,53(10): 2230-2238. | |
[22] | 张启慧, 胡学先, 刘文芬 ,等. 改进的三方口令验证元认证密钥交换协议[J]. 软件学报, 2020,31(10): 3238-3250. |
ZHANG Q H , HU X X , LIU W F ,et al. Improved verifier-based three-party password-authenticated key exchange protocol[J]. Journal of Software, 2020,31(10): 3238-3250. | |
[23] | 舒琴, 王圣宝, 胡斌 ,等. 理想格上基于验证元的三方口令认证密钥交换协议[J]. 密码学报, 2021,8(2): 294-306. |
SHU Q , WANG S B , HU B ,et al. Verifier-based three-party password-authenticated key exchange protocol from ideal lattices[J]. Journal of Cryptologic Research, 2021,8(2): 294-306. | |
[24] | ABDALLA M , FOUQUE P A , POINTCHEVAL D . Password-based authenticated key exchange in the three-party setting[C]// 2005 International Workshop on Public Key Cryptography. Berlin:Springer, 2005: 65-84. |
[25] | REGEV O . On lattices,learning with errors,random linear codes,and cryptography[J]. Journal of the ACM, 2009,56(6): 1-40. |
[26] | CRAMER R , SHOUP V . Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption[C]// International Conference on the Theory and Applications of Cryptographic Techniques:Advances in Cryptology. Berlin:Springer, 2002: 45-64. |
[27] | KIEFER F , MANULIS M . Zero-knowledge password policy checks and verifier-based PAKE[C]// 2014 European Symposium on Research in Computer Security. Berlin:Springer, 2014: 295-312. |
[28] | NGUYEN K , TAN B H M , WANG H X . Zero-knowledge password policy check from lattices[C]// 2017 International Conference on Information Security. Berlin:Springer, 2017: 92-113. |
[29] | BELLARE M , POINTCHEVAL D , ROGAWAY P . Authenticated key exchange secure against dictionary attacks[C]// International Conference on the Theory and Applications of Cryptographic Techniques:Advances in Cryptology. Berlin:Springer, 2000: 139-155. |
[1] | Yuanbo GUO, Anqi YIN. Research on password-authenticated key exchange protocol over lattices [J]. Journal on Communications, 2022, 43(12): 172-187. |
[2] | Youheng DONG, Geng ZHAO, Yingjie MA. Two-dimensional pseudo-random coupled map lattices system based on partitioned elementary cellular automata and its dynamic properties [J]. Journal on Communications, 2022, 43(1): 71-82. |
[3] | Miaomiao TIAN, Jing CHEN, Hong ZHONG. Identity-based incremental signature scheme from lattices [J]. Journal on Communications, 2021, 42(1): 108-117. |
[4] | Zhen LIU,Yiliang HAN,Xiaoyuan YANG,Shuguang LIU. Provable security signcryption scheme based on RLWE without trapdoor [J]. Journal on Communications, 2020, 41(6): 14-25. |
[5] | Changgen PENG, Xiaoyu ZHANG, Hongfa DING, Shanhui YANG. Efficient signcryption scheme based on Cocks’ identity cryptosystem [J]. Journal on Communications, 2020, 41(12): 128-138. |
[6] | Youliang TIAN,Qiuxian LI,Duo ZHANG,Linjie WANG. Provably secure rational delegation computation protocol [J]. Journal on Communications, 2019, 40(7): 135-143. |
[7] | Miaomiao TIAN,Chuang GAO,Jie CHEN. Identity-based cloud storage integrity checking from lattices [J]. Journal on Communications, 2019, 40(4): 128-139. |
[8] | Yatao YANG,Xinguang HAN,Jierun HUANG,Yang ZHAO. Bidirectional authentication key agreement protocol supporting identity’s privacy preservation based on RLWE [J]. Journal on Communications, 2019, 40(11): 180-186. |
[9] | Xixi YAN,Yuan LIU,Zichen LI,Yongli TANG,Qing YE. Privacy-preserving attribute-based encryption scheme on ideal lattices [J]. Journal on Communications, 2018, 39(3): 128-135. |
[10] | Caifen WANG,Li CHEN. Three-party password authenticated key agreement protocol with user anonymity based on lattice [J]. Journal on Communications, 2018, 39(2): 21-30. |
[11] | Jinxia YU,Huanhuan LIAN,Yongli TANG,Mengyao SHI,Zongqu ZHAO. Password-based three-party authenticated key exchange protocol from lattices [J]. Journal on Communications, 2018, 39(11): 87-97. |
[12] | Shao-bo YU,Ling-da WU,Xi-tao ZHANG. Research on space information representation model based on formal concept analysis [J]. Journal on Communications, 2017, 38(Z2): 78-85. |
[13] | Yong-li TANG,Ming-xing HU,Kun LIU,Qing YE,Xi-xi YAN. Novel identity-based fully homomorphic encryption scheme from lattice [J]. Journal on Communications, 2017, 38(5): 39-47. |
[14] | Qing YE,Ming-xing HU,Yong-li TANG,Kun LIU,Xi-xi YAN. Novel hierarchical identity-based encryption scheme from lattice [J]. Journal on Communications, 2017, 38(11): 54-64. |
[15] | Zhi-yan XU,Li-bing WU,Li LI,De-biao HE. New certificateless aggregate signature scheme with universal designated verifier [J]. Journal on Communications, 2017, 38(11): 76-83. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|