CORC  > 软件研究所  > 信息安全国家重点实验室  > 期刊论文
security model and modular design of fair authentication key exchange protocols
Feng DengGuo ; Chen WeiDong
刊名SCIENCE CHINA-INFORMATION SCIENCES
2010
卷号53期号:2页码:278-287
关键词authentication key exchange protocols deniability fairness concurrent signature provable security
ISSN号1674-733X
学科主题Computer Science ; Information Systems
公开日期2011-05-23
附注It is traditionally assumed that the legal two parties in authentication key exchange (AKE) communications are both credible. However, in more and more network applications nowadays, it is often required that such protocols be run under the circumstances where ones do not trust in each other. Therefore, in this paper we propose the idea of fair authentication key exchange (FAKE), which has not only the basic properties of AKE protocols, but also some new properties: the "session proof" embedded in the input of protocols by the customer; and if not revealed, the protocols have the deniability, otherwise the transcript of protocol is binding for the identifications. Such a method is capable of solving the contradiction between protecting privacy and the dissension on network service. Then the security model of FAKE protocols is formulated systematically and a flaw of the security model of current signature schemes proposed by Kudla is also corrected. Finally, a kind of FAKE protocol based on current signature schemes is designed and the mBJM-AK security, conditional deniability and fairness of FAKE protocols are proved in the random oracle model.
内容类型期刊论文
源URL[http://124.16.136.157/handle/311060/9784]  
专题软件研究所_信息安全国家重点实验室_期刊论文
推荐引用方式
GB/T 7714
Feng DengGuo,Chen WeiDong. security model and modular design of fair authentication key exchange protocols[J]. SCIENCE CHINA-INFORMATION SCIENCES,2010,53(2):278-287.
APA Feng DengGuo,&Chen WeiDong.(2010).security model and modular design of fair authentication key exchange protocols.SCIENCE CHINA-INFORMATION SCIENCES,53(2),278-287.
MLA Feng DengGuo,et al."security model and modular design of fair authentication key exchange protocols".SCIENCE CHINA-INFORMATION SCIENCES 53.2(2010):278-287.
个性服务
查看访问统计
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。


©版权所有 ©2017 CSpace - Powered by CSpace