Computer Science ›› 2010, Vol. 37 ›› Issue (1): 118-121.

Previous Articles     Next Articles

Novel Security Protocol and Strand Space Analysis

PI Jian-yong,YANG Lei,LIU Xin-song,LI Ze-ping   

  • Online:2018-12-01 Published:2018-12-01

Abstract: We proposed a novel PJY identity authentication and key agreement security protocol based on computational difficulty of discrete logarithm in finite field. The PJY security protocol can validate identity of the both parties with two session, and generate peer session key. We analyzed the correctness of the security protocol on strand space model. First we constructed infiltrate strand space, and proved the PJY security protocol has injective agreement and secrecy by authentication tests under arbitrary penetration strand, so proved the PJY security protocol is correct.

Key words: PJY security protocol, Strand space, Authentication tests, Injective agreement, Secrecy

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!