Method for switching three-partner key with privacy protection based on password authentication

A technology of key exchange and password authentication, applied in the fields of security technology and privacy protection technology, it can solve the problems such as the inability to effectively protect the privacy of participating users, and achieve the effect of ensuring that it will not be leaked.

Inactive Publication Date: 2008-10-08
INST OF INFORMATION ENG CAS
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method better overcomes the disadvantage that the existing three-party key exchange scheme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for switching three-partner key with privacy protection based on password authentication
  • Method for switching three-partner key with privacy protection based on password authentication
  • Method for switching three-partner key with privacy protection based on password authentication

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0024] Example 1

[0025] In the specific structure of this embodiment, we use Tzeng's oblivious transfer (OT) scheme (Wen-Guey Tzeng. Efficient 1-out-n oblivious transfer schemes. In David Naccache et al., editors, Public Key Cryptography) -PKC 2002, LNCS 2274, pages 159-171. Springer, 2002) embedded in the 3PAKE scheme of Abdalla et al. (M.Abdalla and D.Pointcheval.Interactive diffie-hellmanassumptions with applications to password-based authentication.In ASPatrick et al ., editors, Financial Cryptography and Data Security-FC 2005, LNCS 3570, pages 341-356. Springer, 2005.) in a simple variant to implement a key exchange method based on password authentication with privacy protection.

[0026] Let G be a cyclic group of prime order of order p, and g and h are two generators of G respectively. Let l r Is a safety parameter, and Q 1 , Q 2 , H 1 , H 2 And H 3 Yes { 0,1 } * → ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to an authenticated key exchange technique, and discloses a three-party password-based authenticated key exchange method which is provided with a privacy protection. The method comprises the following steps: an initialization step, exchanging the reserved information by two client subscribers which prepare to do key exchange; a client initialization stage, ciphering the information respectively by two client subscribers which prepare to do key exchange with the respective passwords and sharing passwords in the server and transmitting to the server together with the non-ciphered information; a server procession stage, when the server receives the request information from the client, using an oblivious transfer mechanism for processing these information and generating different returning information aiming at each one in two client subscribers, and then respectively transmitting these information to corresponding client subscriber; a client authorization step, when the client receives the returning information of the server, adopting a mechanism of normal key exchange for processing the returned information based on the password itself in order to generate the seed of the conversation key, and generating the authorization information with the seed of the conversation key for transmitting to the subscriber of the other side; and a conversation key generating step, if the authorization information from the subscriber of the other side is authorized, generating the conversation key with the seed of the conversation key. Compared with prior art, the plan not only realizes the three-party password-based authenticated key exchange, but also simultaneously and effectively protects the privacy information comprising identity and participation action of the client subscriber which participates the key exchange.

Description

technical field [0001] The invention relates to the key exchange technology based on password authentication, in particular to the security technology and privacy protection technology related to the key exchange technology based on password authentication. Background technique [0002] In Three-Party Password-based Authenticated Key Exchange ("3PAKE"), two client users share a password with the online server in advance, and then based on the password, the two users share a password on the server. Assist in mutual authentication and establish session keys. Since the password is a very short string, the amount of storage required is small and it is easy for humans to remember. It does not require additional external devices for storing keys, nor does it require public key infrastructure (PKI), so the three-party key based on password authentication Exchange protocols are widely used in practical secure communication. [0003] The three-party key exchange system based on pas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
Inventor 胡磊汪维家李勇
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products