首页 | 本学科首页   官方微博 | 高级检索  
     

一种两方认证密钥协商方案的分析与改进*
引用本文:舒剑. 一种两方认证密钥协商方案的分析与改进*[J]. 计算机应用研究, 2011, 28(12): 4660-4662
作者姓名:舒剑
作者单位:江西财经大学电子商务系,南昌330013;电子科技大学计算机科学与工程学院,成都611731
基金项目:国家“863”高技术研究发展计划基金资助项目(2009AA012415)
摘    要:基于签密方案,Liu-Xu利用椭圆曲线群构造了一种高效、强安全的两方认证密钥协商协议.对Liu-Xu提出的方案进行安全性分析,指出该方案不具有强安全性.该方案不能抵抗临时私钥泄露攻击,并且方案不具有完美前向安全的特性.分析了方案不安全的原因在于传送的消息存在冗余,并在此基础上提出一种改进的方案来修正Liu-Xu的方案.

关 键 词:签密  椭圆曲线  强安全性:完美前向安全  冗余

Analysis and improvement of two-party key authenticated agreement scheme
SHU Jian. Analysis and improvement of two-party key authenticated agreement scheme[J]. Application Research of Computers, 2011, 28(12): 4660-4662
Authors:SHU Jian
Affiliation:(1.Dept. of E-commerce, Jiangxi University of Finance & Economics, Nanchang 330013, China; 2.School of Computer Science & Enginee-ring, University of Electronic & Technology of China, Chengdu 611731, China)
Abstract:Based on signcryption scheme,Liu-Xu proposed an efficient and strong secure two-party key agreement protocol,which worked in an elliptic curve group.Security analysis showed that the scheme did not achieve strong security.The protocol,however,was susceptible to leakage of ephemeral secrets attack,and couldn't provide perfect forward security.Accor-dingly,the current paper demonstrated the vulnerability of Liu-Xu's protocol against such attacks due to redundancy of the exchange messages,and then presented an...
Keywords:signcryption  elliptic curve  strong security  perfect forward secrecy  redundancy  
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机应用研究》浏览原始摘要信息
点击此处可从《计算机应用研究》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号