• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

用于优化通信的三方认证密钥协商

Three-party authenticated key agreements for optimal communication.

作者信息

Lee Tian-Fu, Hwang Tzonelih

机构信息

Department of Medical Informatics, Institute of Medical Sciences, Tzu Chi University, Hualien, Taiwan, ROC.

Department of Computer Science and Information Engineering, National Cheng Kung University, Tainan, Taiwan, ROC.

出版信息

PLoS One. 2017 Mar 29;12(3):e0174473. doi: 10.1371/journal.pone.0174473. eCollection 2017.

DOI:10.1371/journal.pone.0174473
PMID:28355253
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC5371375/
Abstract

Authenticated key agreements enable users to determine session keys, and to securely communicate with others over an insecure channel via the session keys. This study investigates the lower bounds on communications for three-party authenticated key agreements and considers whether or not the sub-keys for generating a session key can be revealed in the channel. Since two clients do not share any common secret key, they require the help of the server to authenticate their identities and exchange confidential and authenticated information over insecure networks. However, if the session key security is based on asymmetric cryptosystems, then revealing the sub-keys cannot compromise the session key. The clients can directly exchange the sub-keys and reduce the transmissions. In addition, authenticated key agreements were developed by using the derived results of the lower bounds on communications. Compared with related approaches, the proposed protocols had fewer transmissions and realized the lower bounds on communications.

摘要

认证密钥协商使用户能够确定会话密钥,并通过会话密钥在不安全的信道上与他人进行安全通信。本研究调查了三方认证密钥协商的通信下限,并考虑了生成会话密钥的子密钥是否会在信道中被泄露。由于两个客户端不共享任何公共密钥,它们需要服务器的帮助来认证其身份,并在不安全的网络上交换机密和经过认证的信息。然而,如果会话密钥安全性基于非对称密码系统,那么泄露子密钥不会危及会话密钥。客户端可以直接交换子密钥并减少传输量。此外,利用通信下限的推导结果开发了认证密钥协商。与相关方法相比,所提出的协议传输次数更少,并实现了通信下限。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/21fe/5371375/255a5afb5757/pone.0174473.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/21fe/5371375/5527f4ea603d/pone.0174473.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/21fe/5371375/c7a69bf8f6bd/pone.0174473.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/21fe/5371375/cdb00f67bb21/pone.0174473.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/21fe/5371375/4b7ca771f46b/pone.0174473.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/21fe/5371375/7059f3980f4f/pone.0174473.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/21fe/5371375/255a5afb5757/pone.0174473.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/21fe/5371375/5527f4ea603d/pone.0174473.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/21fe/5371375/c7a69bf8f6bd/pone.0174473.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/21fe/5371375/cdb00f67bb21/pone.0174473.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/21fe/5371375/4b7ca771f46b/pone.0174473.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/21fe/5371375/7059f3980f4f/pone.0174473.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/21fe/5371375/255a5afb5757/pone.0174473.g006.jpg

相似文献

1
Three-party authenticated key agreements for optimal communication.用于优化通信的三方认证密钥协商
PLoS One. 2017 Mar 29;12(3):e0174473. doi: 10.1371/journal.pone.0174473. eCollection 2017.
2
Simple group password-based authenticated key agreements for the integrated EPR information system.用于集成电子病历信息系统的基于简单群组密码的认证密钥协商协议
J Med Syst. 2013 Apr;37(2):9916. doi: 10.1007/s10916-012-9916-1. Epub 2013 Jan 19.
3
On the security of a simple three-party key exchange protocol without server's public keys.关于一种无服务器公钥的简单三方密钥交换协议的安全性
ScientificWorldJournal. 2014;2014:479534. doi: 10.1155/2014/479534. Epub 2014 Sep 1.
4
Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems.基于扩展混沌映射的高效生物认证密钥协议在远程医疗信息系统中的应用。
J Med Syst. 2015 May;39(5):58. doi: 10.1007/s10916-015-0240-4. Epub 2015 Mar 22.
5
Performance analysis: Securing SIP on multi-threaded/multi-core proxy server using public keys on Diffie-Hellman (DH) in single and multi-server queuing scenarios.性能分析:在单服务器和多服务器排队场景中,使用Diffie-Hellman(DH)公钥在多线程/多核代理服务器上保护SIP安全。
PLoS One. 2024 Jan 25;19(1):e0293626. doi: 10.1371/journal.pone.0293626. eCollection 2024.
6
Password-only authenticated three-party key exchange with provable security in the standard model.在标准模型中具有可证明安全性的仅密码认证三方密钥交换。
ScientificWorldJournal. 2014;2014:825072. doi: 10.1155/2014/825072. Epub 2014 Apr 14.
7
Verifier-based three-party authentication schemes using extended chaotic maps for data exchange in telecare medicine information systems.基于验证器的三方认证方案,使用扩展混沌映射实现远程医疗信息系统中的数据交换。
Comput Methods Programs Biomed. 2014 Dec;117(3):464-72. doi: 10.1016/j.cmpb.2014.09.006. Epub 2014 Oct 2.
8
Secure access control using updateable attribute keys.使用可更新属性密钥进行安全访问控制。
Math Biosci Eng. 2022 Aug 9;19(11):11367-11379. doi: 10.3934/mbe.2022529.
9
Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks.使用扩展混沌映射的无线传感器网络高效安全的基于时间凭证的认证密钥协商
Sensors (Basel). 2015 Jun 25;15(7):14960-80. doi: 10.3390/s150714960.
10
An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity.一种基于扩展混沌映射的具有用户匿名性的三方密码认证密钥协商协议。
PLoS One. 2016 Apr 21;11(4):e0153870. doi: 10.1371/journal.pone.0153870. eCollection 2016.