当前位置:首页 > 图书中心 > 学术著作 > 基于PKI的强安全认证密钥交换:安全模型、协议构造和安全分析
基于PKI的强安全认证密钥交换:安全模型、协议构造和安全分析
ISBN:978-7-5689-2221-0
作者:杨铮
策划编辑:杨粮菊 陈力
编辑:陈力
字数(千):375 页数:229 印次:1-1
开本:16开  平装
出版时间: 2021-05-09
定价:¥88

图书推荐

内容简介

暂无内容

目录
Chapter 1Introduction
Background
Structure
Part ⅠPreliminary
Chapter 2Cryptographic Primitives and Complexity Assumptions
2.1Notations
2.2Negligible Functions
2.3Key Exchange Protocols
2.4Digital Signature Schemes
2.5Public Key Encryption Schemes
2.6Key Encapsulation Mechanism Schemes
2.7Non-Interactive Key Exchange Protocols
2.8Tag-based Authentication Schemes
2.9Message Authentication Code
2.1Collision-Resistant Hash Functions
2.11Target Collision-Resistant Hash Functions
2.12Pseudo-Random Functions
2.13Double Pseudo-Random Functions
2.14Min-entropy and Strong Randomness Extractors
2.15Weak Programmable Hash Functions
2.16Bilinear Groups
2.17Multilinear Groups
2.18Complexity Assumptions
Part ⅡSecurity Model
Chapter 3Towards Modelling Perfect Forward Secrecy in Two-message
Authenticated Key Exchange
3.1Two-party Security Models
3.2New Results on Perfect Forward Secrecy for TMAKE
Chapter 4Randomized Authentication Primitive Problem in Key Exchange
4.1Security Definitions Revisit
4.2Randomized Authentication Primitive Problems
4.3Solutions for Avoiding RAP problem
Chapter 5A New Strong Security Model for Stateful Authenticated
Group Key Exchange
5.1Execution Environment
5.2Adversarial Model
5.3Secure AGKE Protocols
Part ⅢCryptanalysis of AKE Protocols
Chapter 6On Security Analysis of an After-the-fact Leakage Key
Exchange Protocol
6.1The ASB protocol
6.2Security Analysis of ASB
Chapter 7Cryptanalysis of a Generic TMAKE Protocol from KEM

7.1The KF Scheme
7.2On the Insecurity of the KF Scheme
7.3Incorrect Security Reduction of the KF Scheme
Chapter 8Cryptanalysis of a Generic TMAKE Protocol from NIKE
8.1The BJS Scheme
8.2The Insecurity and Improvement of the BJS scheme
8.3An Improvement Solution of the BJS Scheme
Part ⅣNew AKE Constructions
Chapter 9Simpler Generic Constructions for Strongly Secure One-round
Key Exchange from Weaker Assumptions
9.1Generic AKE from NIKE
9.2A Generic AKE Construction from simplified NIKE
9.3Efficiency Comparison
Chapter 1New Constructions for (Multiparty) One-round Key Exchange
with Strong Security
1.1A DDH-based ORKE Protocol
1.2An Efficient Multiparty ORKE Protocol
1.3Efficiency Comparison
Chapter 11Two-message Key Exchange with Strong Security from Ideal
Lattices
11.1A Generic TMAKE Construction from OTKEM
11.2An OTKEM from Ring-LWE
11.3Comparison
Chapter 12A Stateful Authenticated Group Key Exchange Protocol with
Strong Security
12.1A Strongly Secure stAGKE Protocol
Conclusions
Bibliography