Font Size: a A A

Research On Anonymous Password-authenticated Key Exchange Protocols

Posted on:2019-12-14Degree:MasterType:Thesis
Country:ChinaCandidate:W C FangFull Text:PDF
GTID:2428330566498596Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
In the information age,network communication is the main channel for message transmission.People enjoy personalized service by sending personal information.Because of the openess of the network and the privateness of such data,secure communication and privacy preservation play an important role in sustainable development of networks.Anonymous authentication,a combination of authentication and identity concealment,can protect session content and privacy effectively.Therefore,it is of great significance in the field of information security.Currently,many web applications provide service for users with corre ct passwords,but lack in privacy preservation.It may become a threat.Thus,we study anonymous password-authenticated key exchange protocols to achieve secure authentication and key agreement in an anonymous state.As a good command of security requirement and protocol attacks is vital to design such protocols,we research related works and show security weakness on several protocols.Since recent protocols are either less secure or not efficient enough,we propose three anonymous protocols to meet requirements within various environments.Among the proposed ones,the password-only protocol overcomes a notorious stolen-verifier attack by taking algebraic message authentication code as password verifier;the device-assisted protocol attains higher performance in anonymous authentication with tamper-proof smart cards;the trusted third party-based protocol improves existed anonymous protocols in peer-to-peer networks in terms of security using chaotic map-based cryptosystem.In the security analysis of the proposed protocols,on the one hand,we discuss the common security requirement and attacks;on the other hand,we formally prove the security of authenticated key exchange based on BAN logic and security models.In the efficiency analysis,through compariso n with other protocols,our advantage lies in better performance under the same security level.Meanwhile,experiment results present high efficiency of our protocols.Also,the protocol implemetaion in an application system verifies its functionality.
Keywords/Search Tags:anonymity, password, authentication, key exchange
PDF Full Text Request
Related items