Authenticated Session Key Distribution Protocol with Zero-Knowledge

Article Preview

Abstract:

Authenticated session key distribution protocol is an important cryptographic technique in the secure communication areas. We present a new method for the authenticated exchange of messages in the three-party case, and abandon the idea of authentication which was finished with encryption and decryption in the Bellare-Rogaway model. Instead, the non-interactive zero-knowledge is applied to our protocol. We give an illumination for some important properties of security and depict a feasible idea of provably security with zero-knowledge.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3190-3194

Citation:

Online since:

December 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] M. Bellare and P. Rogaway: Lecture Notes in Computer Science Vol. 773(1994), pp.232-249.

Google Scholar

[2] M. Bellare and P. Rogaway: Proc. of 27th ACM Symp. on Theory of Computing, Las Vegas(1995), pp.57-66.

Google Scholar

[3] R. Bird, I. Gopal, A. Herzberg, and P. Janson et al.: Lecture Notes in Computer Science Vol. 576(1992), pp.44-61.

Google Scholar

[4] R. M. Needham and M. D. Schroeder: Communications of the ACM, Vol. 21 (1978), pp.993-999.

Google Scholar

[5] Michael Burrows, Martin Abadi, and Roger Needham: ACM Transactions on Computer Systems, Vol. 8(1990), pp.18-36.

Google Scholar

[6] H. Krawczyk: Proc. Of the Symposium on Network and Distributed System Security(1996), pp.114-127.

Google Scholar

[7] V. Shoup and A. Rubin: Lecture Notes in Computer Science Vol. 1070(1996), pp.321-331.

Google Scholar

[8] J.G. Steiner, B.C. Neuman, and J.I. Schiller. Kerberos: Usenix Conference Proceedings, Dallas, Texas(1988), pp.191-202.

Google Scholar

[9] R. Cramer and I. Damgard: Lecture Notes in Computer Science Vol. 2951(2004), pp.223-237.

Google Scholar

[10] D. Boneh and R. Venkatesan: Lecture Notes in Computer Science Vol. 1109(1996), pp.129-142.

Google Scholar