首页 | 本学科首页   官方微博 | 高级检索  
     

可证明安全的后量子两方口令认证密钥协商协议
引用本文:倪亮,张亚伟,王念平,周恒昇,刘笑颜,谷兵珂. 可证明安全的后量子两方口令认证密钥协商协议[J]. 计算机应用研究, 2023, 40(4): 1208-1213+1219
作者姓名:倪亮  张亚伟  王念平  周恒昇  刘笑颜  谷兵珂
作者单位:中原工学院,中原工学院,信息工程大学,中原工学院,中原工学院,中原工学院
基金项目:河南省科技攻关计划项目(182102210130);国家留学基金资助项目(201908410281);国家自然科学基金资助项目(61672031);河南省高等学校重点科研项目(21A520053)
摘    要:口令认证密钥协商可以在客户机和服务器之间建立安全的远程通信,且可以将一个低熵口令放大为一个高熵的会话密钥。然而,随着量子计算技术的快速发展,基于大数分解和离散对数等经典数学难题的PAKA协议面临着严峻的安全挑战。因此,为了构建一个高效安全的后量子PAKA协议,依据改进的Bellare-Pointcheval-Rogaway(BPR)模型,提出了一个基于格的匿名两方PAKA协议,并且使用给出严格的形式化安全证明。性能分析结果表明,该方案与相关的PAKA协议相比,在安全性和执行效率等方面有一定优势,更适用于资源受限的物联网(Internet of Things, IoT)智能移动设备。

关 键 词:口令认证密钥协商  基于格的密码  环上带误差学习  可证明安全  抗离线字典攻击
收稿时间:2022-07-03
修稿时间:2023-03-12

Provably secure post-quantum two-party password authenticated key agreement protocol
Ni Liang,ZhangYawei,Wang Nianping,ZhouHengsheng,Liu Xiaoyan and GU Bingke. Provably secure post-quantum two-party password authenticated key agreement protocol[J]. Application Research of Computers, 2023, 40(4): 1208-1213+1219
Authors:Ni Liang  ZhangYawei  Wang Nianping  ZhouHengsheng  Liu Xiaoyan  GU Bingke
Affiliation:Zhongyuan University of Technology,,,,,
Abstract:Password authentication key agreement can not only establish secure remote communication between client and server, but also amplify a low-entropy password into a high-entropy session key. However, with the rapid development of quantum computing technology, PAKA protocol based on classical mathematical problems such as large number decomposition and discrete logarithm is facing serious security challenges. Thus, in order to construct an efficient and secure post-quantum PAKA protocol, This paper proposes a post-quantum lattice-based anonymous two-party PAKA protocol based on the improved BPR model and gives a strict formal security proof. The performance analysis results show that compared with the related PAKA protocol, it has some advantages in security and execution efficiency. So it is more suitable for resource-constrained Internet of Things smart mobile devices.
Keywords:password authenticated key agreement(PAKA)   lattice-based cryptography   ring learning with error   provable security   resistance to offline dictionary attacks
点击此处可从《计算机应用研究》浏览原始摘要信息
点击此处可从《计算机应用研究》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号