Journal on Communications ›› 2019, Vol. 40 ›› Issue (12): 149-154.doi: 10.11959/j.issn.1000-436x.2019233

• Correspondences • Previous Articles     Next Articles

Verifiable three-party secure key exchange protocol based on eigenvalue

Yanshuo ZHANG1,2,Zehao WANG3,Zhiqiang WANG1,Huiyan CHEN1   

  1. 1 Department of Cryptology Science and Technology,Beijing Electronic Science &Technology Institute,Beijing 100070,China
    2 State Key Laboratory of Cryptology,Beijing 100878,China
    3 Department of System Security,Data Communication Science and Technology Research Institute ,Beijing 100191,China
  • Revised:2019-10-10 Online:2019-12-25 Published:2020-01-16
  • Supported by:
    China Civil Aviation Information Technology Research Base Funded Project(CAAC-ITRB-201705);The Opening Project of Key Lab of Information Network Security of Ministry of Public Security(C17608);Fundamental Research Funds for the Central Universities(328201902)

Abstract:

In order to solve the problem that the traditional key exchange protocol,which was not flexible enough and flawed in security,cannot provide the function of three-party key negotiation,firstly,a simple and flexible three-party key exchange scheme that can resist man-in-the-middle attacks was proposed with the help of secret matrix eigenvalues.However,the validity of key exchange cannot be verified by the scheme,and counterfeiting by middlemen can’t be prevented.Then based on it,the secret matrix was reconstructed,where the matrix order was a large even number,and all the eigenvalues appeared in pairs,similar to the diagonal matrix.Based on the special secret matrix,the verification part which can be used to verify the legitimacy of the communication party was introduced to the scheme,and the verifiable three-party key exchange protocol based on the eigenvalue was given.The protocol not only solved the problem of three-party key exchange,but also verified identity legitimacy.It is proved that it’s feasible to design a three-party key exchange protocol by the eigenvalue.The final protocol is both secure and efficient.

Key words: key exchange, three party, eigenvalue, man-in-the-middle attack, matrix

CLC Number: 

No Suggested Reading articles found!