JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE) ›› 2013, Vol. 43 ›› Issue (2): 11-17.

• Articles • Previous Articles     Next Articles

Passwordauthenticated  key exchange protocol based on certificateless key encapsulation in  the standard model

YANG Jun-han1, CAO Tian-jie1,2   

  1. 1. School of Computer, China University of Mining and Technology, Xuzhou 221116, China;
    2. State Key Laboratory of Information Security, Graduate School of the Chinese Academy of Sciences, Beijing 100039, China
  • Received:2012-12-20 Online:2013-04-20 Published:2012-12-20

Abstract:

To guarantee the security of exchange protocol, a novel passwordauthenticated key exchange protocol without random oracle model was introduced. Clients’ identity information was delivered by the certificateless key encapsulation mechanism. The security of the proposed protocol was proved in the standard model based on decision DiffieHellman (DDH) assumption. Security analysis showed that the provided protocol was forward security and achieved mutual authentication, which could resist multiple attacks.

Key words: certificateless key encapsulation, mutual authentication, password authentication, exchange protocol, standard model

CLC Number: 

  • TP309
[1] WANG Lanzhong, MENG Wenjie. Video perceptual encryption algorithm in remote education receiver [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2015, 45(4): 40-44.
[2] WANG Danhui1, WANG An2*. The efficiency of power analysis attack based on S-boxes of block ciphers [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2014, 44(2): 6-11.
[3] XU Long-qin1, LIU Shuang-yin1,2,3,4*. Water quality prediction model based on APSO-WLSSVR [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2012, 42(5): 80-86.
[4] SUN Lan, LUO Zhao, WU Ying-jie, WANG Yi-lei. An algorithm for protecting location privacy in road network [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2012, 42(5): 96-101.
[5] HANG Guang-qing,KONG Fan-yu,LI Da-xing, . Efficient algorithm with resistance to simple power analysis on Koblitz curves [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2007, 37(3): 78-80 .
[6] YANG Chen,MA Wen-ping,WANG Xin-mei . Practical group signatures based on the knowledge signature [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2007, 37(1): 76-79 .
[7] LIU Yuan-xun,XU Qiu-liang,YUN Xiao-chun . Research on IDS-faced general-purpose application-level protocol identification technology [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2007, 37(1): 65-69 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!