文档介绍:The study on authenticated tripartite key exchange protocolThesis Submitted toShanghai Jiao Tong Universityin partial ful?llment of the requirementfor the degree ofMasterbyWANG Yuanyuan( Computer Science )Thesis Supervisor: CAO ZhenfuDec, 2009??????????????1976??Dif?e-Hellman?DH???????????????????????????????????????????????т????????????????DH?????????????????????????????????????AKE??????????????????????????????????ν??????????ν???????????????????????????????б?????????????????????????????????Ч???????????????????????????ν????????????????????ν??????????Ф?????ν??????????????????????????ν????????Ч??????????1.???????eCK????????????????eCKν?????????б??????????????????KCI?????????????2.???????????????????????????????????????????????????????????????????????????????????????????????eCKν????????????????3.???????????????????σ?????????Ч?ν?????ν???????????б???????????????????????????ν???4.????????????KCI????????????????????????????????????????KCI???????Dif?e-Hellman???????????????ν????eCK??????????????IThe study on authenticated tripartite key exchange protocolABSTRACTIn 1976, Dif?e-Hellman (DH) key exchange protocol was ?rstly proposed to solve theproblem of how two sides without a pre-shared secret negotiate a session key which opensup a new direction for public-key cryptography . However DH protocol can’t resist man-in-middle attack due to lack of authentication. Many researchers have proposed the authen-ticated key exchange (AKE) protocol to resist the man-in-middle attack. In view of thediversity of means of attack from attacker, the formal security model was used to prove thesecurity of the AKE the continuous development of the , there have been many scenarios in-volving a munication, such as merce related to buyers, sellers and trustedthird party, mobile roaming related to the terminal, the local server, remote server. However,the tripartite key exchange protocols lack formal security model, these tripartite protocolsare lack of proof. In view of the importanc