Font Size: a A A

Design Of Authenticated Key Agreement Protocol With Applications

Posted on:2013-10-18Degree:DoctorType:Dissertation
Country:ChinaCandidate:W M LiFull Text:PDF
GTID:1228330374499513Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Key agreement is an important technical means of achieving secure communications over an open network, which allows two or more participants exchange messages and agreement shared session keys under the control of the adversary. Research on authenticated key agreement has been a hot topic in modern cryptography. This dissertation studies on two-party authenticated key agreement protocols, three-party password-based key agreement protocols, cross-realm password-based key agreement protocols and the applications. The major contributions of the dissertation are as follows:1. Based on self-certified public key, a two-party authenticated key agreement protocol is proposed, which is also been used to construct a payment protocol in vehichle ad-hoc network. The payment protocol applies self-certified key agreement to establish symmetric keys, which can be integrated with the payment phase. Thus both the computational cost and communication cost can be reduced. Moreover, the protocol can achieve fair exchange, user anonymity and payment security and be used in both data volume transferred based and one-time event based application.2. Two verifier-based password-authenticated key agreement protocol are presented. The main idea of the verifier-based protocol is to mitigate the amount of damage that can be caused by corruptions in the server. The presented protocols can withstand dictionary attacks and server compromise attack, provide key secrecy and forward secrecy, ensure no key control, stand against known-key attack and man in-the-middle attack, and receive four session keys in performing protocol one time.3. Research on desigining provable security three-party password-authenticated key agreement protocol. We improve the random oracle model and prove a verifier-based password-authenticated key agreement protocol in the three party secure in the improved model. Besides, we we extend the protocol to make it suitable for mobile applications. The extended protocol can achieve efficiency, reliability, flexibility and scalability at the same time. Compared with related works, the extended protocol is more suitable and practical for mobile applications.4. An anonymous password-authenticated and key agreement protocol for roaming services in wireless networks is proposed. The proposed protocol utilizes ECC and overcomes the security drawbacks in former protocols while being efficient. In our design, we pay attention to the computation burden of the home agent, which is neglected in the related works. In addition, in the protocol, user anonymity and untraceability, confidentiality and fairness of session key, mutual authentication between parties and perfect forward secrecy can be realized simultaneously. Compared with previous works, communication overhead and computation cost are lower, which is suitable and practical for roaming services in wireless networks.5. Study on the communication model, security model and protocol design of the cross-realm password-authenticated key agreement protocol. Based on quadratic residues, a new cross-realm C2C-PAKA key agreement protocol is presented. It’s security is proved in the improved random oracle model. In particular, the proposed protocol is implemented without the server’s public key. Therefore, it is more suitable to an imbalanced computing environment where a low-end client device communicates with a powerful server over a broadband network.
Keywords/Search Tags:key agreement, authentication, self-certified public keycryptography, password-authenticated, verifier-based, cross-realm, provablesecurity, random oracle model
PDF Full Text Request
Related items