期刊文献+

Practical Encrypted Key Agreement Using Passwords

Practical Encrypted Key Agreement Using Passwords
下载PDF
导出
摘要 We presented a simple and efficient password-based encrypted key exchange protocol that allows a user to establish secure session keys with remote servers from client terminals in low resource environments. He does not need to carry smart card storing his private information but just needs to know his identity and password. For this purpose, the scheme was implemented over elliptic curves because of their well-known advantages with regard to processing and size constraints. Furthermore, the scheme is provably secure under the assumptions that the hash function closely behaves like a random oracle and that the elliptic curve computational Diffie-Hellman problem is difficult. We presented a simple and efficient password-based encrypted key exchange protocol that allows a user to establish secure session keys with remote servers from client terminals in low resource environments. He does not need to carry smart card storing his private information but just needs to know his identity and password. For this purpose, the scheme was implemented over elliptic curves because of their well-known advantages with regard to processing and size constraints. Furthermore, the scheme is provably secure under the assumptions that the hash function closely behaves like a random oracle and that the elliptic curve computational Diffie-Hellman problem is difficult.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1625-1628,共4页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foun-dation of China (60473021)
关键词 PASSWORD encrypted key exchange Diffie-Hellman assumptions password encrypted key exchange Diffie-Hellman assumptions
  • 相关文献

参考文献4

  • 1Bresson E,Chevassut O,Pointcheval D.New Security Re- sults on Encrypted Key Exchange[].PKC.2004 被引量:1
  • 2Abdalla M,Pointcheval D.Si mple Password-Based Encrypt- ed Key Exchange Protocol[].Topics in Cryptology-CT- RSA.2005 被引量:1
  • 3Abdalla M,Fouque P A,Pointcheval D.Password-Based Authenticated Key Exchange in the Three-Party Setting[].PKC.2005 被引量:1
  • 4Halevi,S,Krawczyk,H.Public-Key Cryptography and Password Protocols[].ACM Transactions on Information and System Security.1999 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部