An Optimal Three Parties Verifier-Based Key Agreement Protocol
碩士 === 國立勤益科技大學 === 資訊工程系 === 98 === Three–party key exchange protocols communications major application environment is that any two clients, they can verify the ability to use a server to establish communication between the two sides belong to the security of their communications channels, the past...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/89958796649721123365 |
id |
ndltd-TW-098NCIT5392001 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-098NCIT53920012016-04-04T04:16:51Z http://ndltd.ncl.edu.tw/handle/89958796649721123365 An Optimal Three Parties Verifier-Based Key Agreement Protocol 一個最佳驗證機制的三方通訊金鑰交換協定 Shen-Heng Huang 黃信衡 碩士 國立勤益科技大學 資訊工程系 98 Three–party key exchange protocols communications major application environment is that any two clients, they can verify the ability to use a server to establish communication between the two sides belong to the security of their communications channels, the past practice is to use the KDC to help users both a user certificate and the distribution of key communications sharing, and the last few years, Server public keys must be well-protected at all times, to ensure that both parties involved in a transaction are able to continue accepting and authenticating messages sent by the server. Accidentally losing or leaking a private key usually results in significant security issues. Recently, researchers have begun proposing new exchange protocols that would not require the use of server public keys. The main purpose of these studies has been to resolve the previously mentioned security issues, and thereby enhance the security of communication exchanges through these new protocols. Such measures could help to prevent serious losses caused by server attacks or code cracking. A trusted third party would assist in the key exchange procedure. In the exchange process, the server would verify the identities and access codes of both parties, and assign them each common communication keys. Most of these protocols require to using server public key to prevent on-line password guessing attack and off-line password guessing attack, However, the approach of using server public is not always a satisfactory solution and is impractical for some environments. The paper propose a new and efficient key agreement protocol for forward secrecy. Tsung-Hung Lin 林宗宏 2010 學位論文 ; thesis 57 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立勤益科技大學 === 資訊工程系 === 98 === Three–party key exchange protocols communications major application environment is that any two clients, they can verify the ability to use a server to establish communication between the two sides belong to the security of their communications channels, the past practice is to use the KDC to help users both a user certificate and the distribution of key communications sharing, and the last few years, Server public keys must be well-protected at all times, to ensure that both parties involved in a transaction are able to continue accepting and authenticating messages sent by the server. Accidentally losing or leaking a private key usually results in significant security issues. Recently, researchers have begun proposing new exchange protocols that would not require the use of server public keys. The main purpose of these studies has been to resolve the previously mentioned security issues, and thereby enhance the security of communication exchanges through these new protocols. Such measures could help to prevent serious losses caused by server attacks or code cracking. A trusted third party would assist in the key exchange procedure. In the exchange process, the server would verify the identities and access codes of both parties, and assign them each common communication keys. Most of these protocols require to using server public key to prevent on-line password guessing attack and off-line password guessing attack, However, the approach of using server public is not always a satisfactory solution and is impractical for some environments. The paper propose a new and efficient key agreement protocol for forward secrecy.
|
author2 |
Tsung-Hung Lin |
author_facet |
Tsung-Hung Lin Shen-Heng Huang 黃信衡 |
author |
Shen-Heng Huang 黃信衡 |
spellingShingle |
Shen-Heng Huang 黃信衡 An Optimal Three Parties Verifier-Based Key Agreement Protocol |
author_sort |
Shen-Heng Huang |
title |
An Optimal Three Parties Verifier-Based Key Agreement Protocol |
title_short |
An Optimal Three Parties Verifier-Based Key Agreement Protocol |
title_full |
An Optimal Three Parties Verifier-Based Key Agreement Protocol |
title_fullStr |
An Optimal Three Parties Verifier-Based Key Agreement Protocol |
title_full_unstemmed |
An Optimal Three Parties Verifier-Based Key Agreement Protocol |
title_sort |
optimal three parties verifier-based key agreement protocol |
publishDate |
2010 |
url |
http://ndltd.ncl.edu.tw/handle/89958796649721123365 |
work_keys_str_mv |
AT shenhenghuang anoptimalthreepartiesverifierbasedkeyagreementprotocol AT huángxìnhéng anoptimalthreepartiesverifierbasedkeyagreementprotocol AT shenhenghuang yīgèzuìjiāyànzhèngjīzhìdesānfāngtōngxùnjīnyàojiāohuànxiédìng AT huángxìnhéng yīgèzuìjiāyànzhèngjīzhìdesānfāngtōngxùnjīnyàojiāohuànxiédìng AT shenhenghuang optimalthreepartiesverifierbasedkeyagreementprotocol AT huángxìnhéng optimalthreepartiesverifierbasedkeyagreementprotocol |
_version_ |
1718214047900368896 |