 |
|
|
|
 |
 |
 |
|
 |
|
 |
|
|
魏福山,张刚,马建峰,马传贵.标准模型下隐私保护的多因素密钥交换协议.软件学报,2016,27(6):1511-1522 |
标准模型下隐私保护的多因素密钥交换协议 |
Privacy-Preserving Multi-Factor Key Exchange Protocol in the Standard Model |
投稿时间:2015-08-15 修订日期:2015-10-09 |
DOI:10.13328/j.cnki.jos.005001 |
中文关键词: 多因素认证密钥交换协议 标准模型 模糊提取器 签名方案 |
英文关键词:multi-factor authenticated key exchange protocol standard model fuzzy extractor signature scheme |
基金项目:国家自然科学基金(61309016,61379150,61201220,U1135002,U1405255);国家高技术研究发展计划(863)(2015AA011704);中国博士后科学基金(2014M562493);陕西省博士后科学基金;信息保障技术重点实验室开放课题(KJ-13-02);高校基本业务费项目(JB161501);河南省科技攻关重点项目(092101210502,122102210126) |
|
摘要点击次数: 3618 |
全文下载次数: 2310 |
中文摘要: |
多因素认证密钥交换协议融合多种不同的认证因素来实现强安全的身份认证和访问控制,在具有高级别安全应用需求的移动泛在服务中具有巨大的应用潜力.现阶段多因素协议的研究成果还不丰富,并且已有协议都是在随机预言模型下可证明安全的.以两方口令认证密钥交换协议、鲁棒的模糊提取器以及签名方案为基本组件提出了一个标准模型下可证明安全的多因素协议.协议中服务器不知道用户的生物模板,因此实现了对生物信息的隐私保护.与已有的随机预言模型下的多因素协议相比,该协议在满足更高安全性的同时具有更高的计算效率和通信效率,因此更满足高级别安全的移动泛在服务的应用需求. |
英文摘要: |
Multi-factor authenticated key exchange (MFAKE) protocols combine different authentication factors to realize strong secure identity authentication and access control, and have great application potential in mobile ubiquitous services with high-level security requirements. Until now, literatures about MFAKE protocols are rare and far from satisfactory. Moreover, existing multi-factor authenticated key exchange protocols are proven secure only in the random oracle model. The study proposes a MFAKE protocol using two-party password authenticated key exchange protocols, fuzzy extractors and signature schemes as building blocks. The security of this MFAKE protocol is conducted in the standard model. The server does not need to know the biometric template of the user, thus the biometric privacy of the user is preserved. Compared with existing MFAKE protocols, our protocol achieves stronger security with lower computation and communication costs. Consequently, the proposed protocol is more suitable for mobile ubiquitous services with high-level security requirements. |
HTML 下载PDF全文 查看/发表评论 下载PDF阅读器 |
|
|
|
|
|
|
 |
|
|
|
|
 |
|
 |
|
 |
|