{"title":"基于CDH假设的eck安全认证密钥协议","authors":"Mengzhi Liu, Yanli Zhao, Shuying Chen","doi":"10.1109/COMPCOMM.2016.7924695","DOIUrl":null,"url":null,"abstract":"By far, the extended Canetti-Krawczyk (eCK) model still is one of strongest security model for authenticated key exchange (AKE) protocols. In this paper, a secure authenticated key agreement protocol named SAKA is analyzed in the model, the results show that the SAKA protocol does not support forward security which all key exchange protocol should satisfy. Furthermore, it does not meet security goals of the eCK model. In order to overcome all of above flaws, a variant of SAKA protocol is proposed based on Computation Diffie-Hellman assumption, and secure analysis shows that the new protocol has some good security properties including perfect forward secrecy and known session key excepting those desired security properties that SAKA has. Furthermore, fewer number of modular exponentiation indicates that the new scheme is more efficient.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"eCK-security authenticated key agreement protocol based on CDH assumption\",\"authors\":\"Mengzhi Liu, Yanli Zhao, Shuying Chen\",\"doi\":\"10.1109/COMPCOMM.2016.7924695\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"By far, the extended Canetti-Krawczyk (eCK) model still is one of strongest security model for authenticated key exchange (AKE) protocols. In this paper, a secure authenticated key agreement protocol named SAKA is analyzed in the model, the results show that the SAKA protocol does not support forward security which all key exchange protocol should satisfy. Furthermore, it does not meet security goals of the eCK model. In order to overcome all of above flaws, a variant of SAKA protocol is proposed based on Computation Diffie-Hellman assumption, and secure analysis shows that the new protocol has some good security properties including perfect forward secrecy and known session key excepting those desired security properties that SAKA has. Furthermore, fewer number of modular exponentiation indicates that the new scheme is more efficient.\",\"PeriodicalId\":210833,\"journal\":{\"name\":\"2016 2nd IEEE International Conference on Computer and Communications (ICCC)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 2nd IEEE International Conference on Computer and Communications (ICCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMPCOMM.2016.7924695\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMPCOMM.2016.7924695","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
eCK-security authenticated key agreement protocol based on CDH assumption
By far, the extended Canetti-Krawczyk (eCK) model still is one of strongest security model for authenticated key exchange (AKE) protocols. In this paper, a secure authenticated key agreement protocol named SAKA is analyzed in the model, the results show that the SAKA protocol does not support forward security which all key exchange protocol should satisfy. Furthermore, it does not meet security goals of the eCK model. In order to overcome all of above flaws, a variant of SAKA protocol is proposed based on Computation Diffie-Hellman assumption, and secure analysis shows that the new protocol has some good security properties including perfect forward secrecy and known session key excepting those desired security properties that SAKA has. Furthermore, fewer number of modular exponentiation indicates that the new scheme is more efficient.