Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Three-party password-based authenticated key exchange protocol in no need of smart card

A key agreement and password authentication technology, which is applied in the field of three-party password authentication and key agreement agreement, can solve the problems of low protocol performance requirements, low efficiency and low security attack efficiency of the same type of protocol, and achieve the effect of solving leakage

Inactive Publication Date: 2018-01-16
HARBIN INST OF TECH SHENZHEN GRADUATE SCHOOL
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Because in the actual production and application environment, the performance requirements of the protocol may not be high, and economic and convenience factors are more valued, people choose not to use smart cards to realize functions such as communication party identity authentication and key negotiation; and, according to the aforementioned literature analysis, Many protocols of the same type suffer from security attacks or are inefficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Three-party password-based authenticated key exchange protocol in no need of smart card
  • Three-party password-based authenticated key exchange protocol in no need of smart card
  • Three-party password-based authenticated key exchange protocol in no need of smart card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0035] A three-party password authentication and key agreement protocol without a smart card, which includes the following steps:

[0036] A. Initialization phase: server S initializes some parameters and publishes these parameters {p,α,h 1 (.), ID S , T s (α)}, where T s (α) as the public key of S, and store s as the private key of S in the database; this protocol does not require a smart card;

[0037] B. If figure 1 As shown, the registration stage: legal user U i If you want to register your own information on the server S, you will first initiate a registration request, and the specific steps are as follows;

[0038] B1: U i choose your own ID i and pas...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a three-party password-based authenticated key exchange protocol in no need of a smart card. The method comprises the following steps: A, in an initialization stage, a server Sinitializes certain parameters and publishes the parameters {p, alpha, h1(.), IDS and Ts(alpha)}, wherein Ts(alpha) is used as the public key of the S, the s is used as the private key of the S and the two keys are stored in a database, and the protocol does not need a smart card; B, in a registration stage, is a legal user Ui wants to register the self information to the server S, a registrationrequest is firstly initiated; C, authenticated key exchange is carried out; and D, in a password exchange stage, when a user A feels that the current password may be or is already leaked out, a new password needs to be exchanged in order to reduce unnecessary losses. The unsafe problems, such as disclosure and theft of information between two parties in the Internet communication, can be solved,the authenticated key exchange purposes are realized in the communication process with no need of assistance of the smart card, and the higher performance and the higher efficiency are realized in a similar safety protocol.

Description

technical field [0001] The invention relates to a three-party password authentication and key negotiation protocol without smart cards. Background technique [0002] Due to the continuous promotion and expansion of the network, there are more and more hidden dangers in safety. For example, the increasingly common online payment of e-commerce, portal websites and e-mails, etc. will transmit some users' privacy and other related sensitive information, which may be maliciously hijacked and tampered by attackers. Once a security leak occurs, it will basically cause great or even unlimited losses to users. Therefore, information security has become an urgent need for people, and it is also a guarantee for the normal operation of almost all network communications. [0003] The AKE protocol assists both communicating parties to authenticate each other and establish a session key to protect subsequent communication content. Password-based authenticated key exchange (PAKE) protoco...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06
Inventor 陈建铭吴祖扬王景行徐琳琳
Owner HARBIN INST OF TECH SHENZHEN GRADUATE SCHOOL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products