JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE) ›› 2013, Vol. 43 ›› Issue (2): 11-17.

• Articles • Previous Articles     Next Articles

Passwordauthenticated  key exchange protocol based on certificateless key encapsulation in  the standard model

YANG Jun-han1, CAO Tian-jie1,2   

  1. 1. School of Computer, China University of Mining and Technology, Xuzhou 221116, China;
    2. State Key Laboratory of Information Security, Graduate School of the Chinese Academy of Sciences, Beijing 100039, China
  • Received:2012-12-20 Online:2013-04-20 Published:2012-12-20

Abstract:

To guarantee the security of exchange protocol, a novel passwordauthenticated key exchange protocol without random oracle model was introduced. Clients’ identity information was delivered by the certificateless key encapsulation mechanism. The security of the proposed protocol was proved in the standard model based on decision DiffieHellman (DDH) assumption. Security analysis showed that the provided protocol was forward security and achieved mutual authentication, which could resist multiple attacks.

Key words: certificateless key encapsulation, mutual authentication, password authentication, exchange protocol, standard model

CLC Number: 

  • TP309
[1] Haijun ZHANG,Yinghui CHEN. Semantic analysis and vectorization for intelligent detection of big data cross-site scripting attacks [J]. Journal of Shandong University(Engineering Science), 2020, 50(2): 118-128.
[2] WANG Lanzhong, MENG Wenjie. Video perceptual encryption algorithm in remote education receiver [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2015, 45(4): 40-44.
[3] WANG Danhui1, WANG An2*. The efficiency of power analysis attack based on S-boxes of block ciphers [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2014, 44(2): 6-11.
[4] XU Long-qin1, LIU Shuang-yin1,2,3,4*. Water quality prediction model based on APSO-WLSSVR [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2012, 42(5): 80-86.
[5] SUN Lan, LUO Zhao, WU Ying-jie, WANG Yi-lei. An algorithm for protecting location privacy in road network [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2012, 42(5): 96-101.
[6] HANG Guang-qing,KONG Fan-yu,LI Da-xing, . Efficient algorithm with resistance to simple power analysis on Koblitz curves [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2007, 37(3): 78-80 .
[7] YANG Chen,MA Wen-ping,WANG Xin-mei . Practical group signatures based on the knowledge signature [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2007, 37(1): 76-79 .
[8] LIU Yuan-xun,XU Qiu-liang,YUN Xiao-chun . Research on IDS-faced general-purpose application-level protocol identification technology [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2007, 37(1): 65-69 .
[9] LI Rui-feng, YI Zheng-ge, YUAN Wen-yong, YANG Xiao-yuan, NIU Ke. ECDSA-based auditing scheme for cloud storage [J]. Journal of Shandong University(Engineering Science), 2022, 57(5): 57-65.
[10] NING Zhi-qiang, PAN Feng, NIU Ke, CHEN Pei. Reversible data hiding in motion vector based on regression prediction [J]. Journal of Shandong University(Engineering Science), 2022, 57(5): 66-73.
[11] WANG Li-na, CHEN Si, ZHANG Tong, QIN Peng, XU Lai. Improved peripheral register category scheme for IoT firmware testing [J]. Journal of Shandong University(Engineering Science), 2022, 57(5): 85-91.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] ZHANG Yong-hua,WANG An-ling,LIU Fu-ping . The reflected phase angle of low frequent inhomogeneous[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2006, 36(2): 22 -25 .
[2] KONG Xiang-zhen,LIU Yan-jun,WANG Yong,ZHAO Xiu-hua . Compensation and simulation for the deadband of the pneumatic proportional valve[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2006, 36(1): 99 -102 .
[3] LAI Xiang . The global domain of attraction for a kind of MKdV equations[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2006, 36(1): 87 -92 .
[4] YU Jia yuan1, TIAN Jin ting1, ZHU Qiang zhong2. Computational intelligence and its application in psychology[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(1): 1 -5 .
[5] JI Tao,GAO Xu/sup>,SUN Tong-jing,XUE Yong-duan/sup>,XU Bing-yin/sup> . Characteristic analysis of fault generated traveling waves in 10 Kv automatic blocking and continuous power transmission lines[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2006, 36(2): 111 -116 .
[6] . [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(1): 27 -32 .
[7] QIN Tong, SUN Fengrong*, WANG Limei, WANG Qinghao, LI Xincai. 3D surface reconstruction using the shape based interpolation guided by maximal discs[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2010, 40(3): 1 -5 .
[8] ZHANG Ying,LANG Yongmei,ZHAO Yuxiao,ZHANG Jianda,QIAO Peng,LI Shanping . Research on technique of aerobic granular sludge cultivationby seeding EGSB anaerobic granular sludge[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2006, 36(4): 56 -59 .
[9] Yue Khing Toh1, XIAO Wendong2, XIE Lihua1. Wireless sensor network for distributed target tracking: practices via real test bed development[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(1): 50 -56 .
[10] SUN Weiwei, WANG Yuzhen. Finite gain stabilization of singlemachine infinite bus system subject to saturation[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(1): 69 -76 .