期刊文献+

可证明安全的智能移动终端私钥保护方案 被引量:3

Provably secure private key protection scheme for smart mobile terminal
下载PDF
导出
摘要 提出一种可证明安全的智能移动终端私钥保护方案。充分利用口令保护、密钥分割与服务器动态交互获取部分私钥等技术保证用户私钥安全。与其他方案相比,该方案的优势在于:减少了智能移动终端的计算量和存储量,简化了交互过程参数的设置;将时间同步贯穿整个方案的设计过程,防止重放攻击的同时,更提供了便捷高效的用户私钥失效方案。方案达到了安全私钥获取和高效私钥失效的效果,符合智能移动终端的安全应用需求,在随机预言机模型下是可证明安全的。 A provable security scheme for private key protection of smart mobile terminal (SMT) was presented. In the scheme a improved security mechanism is incorporated, which includes password protection, key division and partial key retrieval from server of strong computing capability in order to protect private key security. Compared with previous proposals, the scheme has the following advantages. It reduces computation amount and storage of SMT, and simplifies parameter setting for interaction processes. It takes time synchronization between SMT and server into account. The latter characteristic not only provides better protection of scheme from replay attacks, but also offers a highly efficient mechanism of user private key disabling, and avoiding complex operation of user and extra storage of other device. The investigation has indicated that improved private key protection to SMT can be well achieved with this scheme. The scheme has also been proved to provide satisfactory security in the random oracle model.
出处 《通信学报》 EI CSCD 北大核心 2012年第12期108-115,共8页 Journal on Communications
基金 长江学者和创新团队发展计划基金资助项目(IRT1078) 国家自然基金委员会--广东联合基金重点基金资助项目(U1135002) 国家科技部重大专项基金资助项目(2011ZX03005-002) 河南省科技创新杰出青年计划基金资助项目(104100510025)~~
关键词 私钥保护 可证明安全 随机预言机模型 private key protection provable security random oracle model
  • 相关文献

参考文献14

  • 1STUDER A, PERRIG A. Mobile user location-specific encryption (MULE): using your office as your password[A]. Proceedings of the 3rd ACM Conference on Wireless Network Security (WiSec '10)[C]. 2010. 被引量:1
  • 2VILA E, BOROVSKA P. Data protection utilizing trusted platform module[J]. Opportunities in Opportunistic Computing, 2010, 43(1): 42-50. 被引量:1
  • 3Trusted Computing Group.TPM main part 3 commands, specification version 1.2, level 2 revision 103[EB/OL]. http://www, trustedcomput- inggroup.org, 2007. 被引量:1
  • 4JOHN E LEE R B. Protecting cryptographic keys and Computationsvia virtual secure coprocessing[A]. ACM SIGARCH Computer Archi- tecture News[C]. 2005. 被引量:1
  • 5LOCASTO M E, SIDIROGLOU S, KEROMYTIS A D. Speculative virtual verification: policy-constrained speculative execution[A]. Pro- ceedings of the New Security Paradigms Workshop (NSPW)[C]. 2005. 170-175. 被引量:1
  • 6BELLOVIN S, MERRITT M. Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and pass-word file compromise[A]. Proceedings of the 1st ACM Conference on Computer and Communication Security[C]. New York, 1993.244-250. 被引量:1
  • 7FENG D G, XU J. A new client-to-client password-authenticated key agreement protocol[A]. Proceedings of' IWCC 2009[C1. Berlin, Springer-Verlag, 2009.63-76. 被引量:1
  • 8PERLMAN R, KAUFMAN C. Secure password-based protocol for downloading a private key[A]. Proc NDSS'99[C]. 1999. 被引量:1
  • 9GOLDRE1CH O, GOLDWASSER S, MICALI S. How to construct random functions[J]. ACM, 1986, 33(4):210-217. 被引量:1
  • 10BELLARE M. New proofs for NMAC and HMAC: security without collision-resistance[A]. CRYPTO 2006[C]. Springer Verlag, 2006. 602-619. 被引量:1

同被引文献17

引证文献3

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部