Security model and modular design of fair authentication key exchange protocols

来源 :Science China(Information Sciences) | 被引量 : 0次 | 上传用户:kk77763
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
It is traditionally assumed that the legal two parties in authentication key exchange (AKE) communications are both credible. However, in more and more network applications nowadays, it is often required that such protocols be run under the circumstances where ones do not trust in each other. Therefore, in this paper we propose the idea of fair authentication key exchange (FAKE), which has not only the basic properties of AKE protocols, but also some new properties: the “session proof” embedded in the input of protocols by the customer; and if not revealed, the protocols have the deniability, otherwise the transcript of protocol is binding for the identifications. Such a method is capable of solving the contradiction between protecting privacy and the dissension on network service. Then the security model of FAKE protocols is formulated systematically and a flaw of the security model of current signature schemes proposed by Kudla is also corrected. Finally, a kind of FAKE protocol based on current signature schemes is designed and the mBJM-AK security, conditional deniability and fairness of FAKE protocols are proved in the random oracle model. It is traditionally assumed that the legal two parties in authentication key exchange (AKE) communications are both credible. However, in more and more network applications nowadays, it is often required that such protocols be run under the circumstances where ones do not trust in each other, Therefore this paper we propose the idea of ​​fair authentication key exchange (FAKE), which has not only the basic properties of AKE protocols but also some new properties: the “session proof ” embedded in the input of protocols by the customer; and if not revealed, the protocols have the deniability, otherwise the transcript of protocol is binding for the identifications. Such a method is capable of solving the contradiction between home privacy and the dissension on network service. Then the security model of FAKE protocols is formulated systematically and a flaw of the security model of current signature schemes proposed by Kudla is also corrected. Finally, a kind of FAKE protocol ba sed on current signature schemes is designed and the mBJM-AK security, conditional deniability and fairness of FAKE protocols are proved in the random oracle model.
其他文献
回顾2018年我院综合ICU收治的一例TTP患者的护理.护理重点进行严密的生命体征及神经系统监测,预防出血的发生,加强气道管理,谵妄管理.动态监测患者血小板变化,积极与患者沟通
目的:观察探讨综合护理在急性下肢静脉血栓Angiojet血栓清除术中的应用价值.方法:随机选取沧州市人民医院2016年5月-2018年5月接受的74例急性下肢静脉血栓行Angiojet血栓清除
目的:探究临床合理用药指导对2型糖尿病用药依从性的提升效果.方法:选取我院2019年1月至2019年7月收治的94例2型糖尿病患者作为研究对象,采用区组随机化分组法将患者平均分为
目的:探讨护理员管理存在的问题及管理对策.方法:分析目前我院护理员管理存在的各项问题,针对性的探讨管理对策,加强对护理员的统筹管理和工作培训,以减少不良陪护事件的发生
目的 探析人文关怀护理在精神科门诊护理中的实施效果.方法 选择我院精神科门诊收治的94例患者,随机分成对照组(行常规护理干预)和观察组(行常规护理+人文关怀护理干预),各47
目的:分析治疗胆囊结石合并胆总管结石应用双镜联合的临床效果.方法:择取本院在2018年1月—2019年11月收治的118例进行治疗的胆囊结石合并胆总管结石患者作为受检对象,根据中
围绕当前节能减排重点问题,本文对新闻纸企业自备热电站内的炉、机、水系统实施的节能改造项目进行了简单的介绍,并分析了取得的效益,2006年度的主要产品单位能耗指标比2005
本文简要介绍了广州造纸股份有限公司在马尾松CTMP浆高白度过氧化氢漂白生产实践方面的经验.
通过研究管线钢LD-LF-CC和LD-ANS-OB-CC两条工艺路线钢中氧、氮及夹杂物变化,确定了钢水经过LF炉和ANS-OB两种精炼工艺处理后钢水洁净度是一致的,采用LD-ANS-OB-CC工艺生产某
本文介绍了采用英国马尔文仪器有限公司生产的MASTERSIZER2000型的激光粒度分析仪,应用激光衍射法(LALLS,又称小角激光光散射法)的原理。测定经电解提取出的稳定氧化物夹杂粒
会议