Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for transforming unauthenticated key exchange protocol into authenticated key exchange protocol

A key exchange protocol, non-authentication technology, applied in the field of key exchange protocol, can solve problems such as low efficiency

Inactive Publication Date: 2010-12-15
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the K-Y protocol does not have the above two loopholes in security, its efficiency is relatively low. For example, the number of communication rounds is three, and each user must sign two messages

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for transforming unauthenticated key exchange protocol into authenticated key exchange protocol
  • Method for transforming unauthenticated key exchange protocol into authenticated key exchange protocol
  • Method for transforming unauthenticated key exchange protocol into authenticated key exchange protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for transforming an unauthenticated key exchange protocol into an authenticated key exchange protocol. DSig=(Gen, Sig,Ver) is set as a standard digital signature algorithm by a digital signature method, wherein Gen is a key generation algorithm; Sig is a signature algorithm; Ver is a signature verification algorithm; and Gen generates a pair of signature / verification key pair for a user Ui. Simultaneously, the invention is an authenticated key exchange protocol and is used for fulfilling the aim of sharing one common conversion key among unacquainted members in a published network through interaction. The method for transforming the unauthenticated key exchange protocol into the authenticated key exchange protocol makes up security flaws of the conventional method and has higher security, and simultaneously compared with the conventional method, the method has the advantages of improvement on the calculation amount and communication traffic, and better application prospect.

Description

technical field The invention belongs to the technical field of communication, and in particular relates to a method for converting a non-authenticated key exchange protocol into an authenticated key exchange protocol. Background technique A key exchange protocol is a cryptographic primitive. As the name implies, a key exchange protocol is the establishment of session keys through the cooperation of participants. The key exchange protocol allows two or more participants to exchange information in an insecure channel controlled by the attacker, and negotiate a common session key through these exchanged information. This session key will be used in future secure communication, and the existence of this session key ensures secure communication on non-secure channels. In this way, the secure key exchange protocol can be used as the basic module for constructing secure, complex, high-level protocols. Key exchange protocols can be divided into non-authenticated key exchange pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 许春香李成邦
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products