期刊文献+

无证书两方认证密钥协商协议攻击及改进 被引量:2

Attack and improvement of a certificateless two-party authenticated key agreement protocol
下载PDF
导出
摘要 分析了Kim等人提出的不依赖于双线性对运算的无证书两方认证密钥协商协议,指出该协议在公钥替换攻击下不满足基本伪装攻击安全性,并给出了一个具体攻击。针对该协议存在的安全性缺陷,提出了一个改进的无证书两方认证密钥协商协议。分析表明,所提出的改进协议能够有效地抵抗公钥替换攻击并满足一些必要的安全属性。 This paper analyzed a bilinear pairing-free certificateless two-party authenticated key agreement protocol proposed by Kim et al. The protocol did not satisfy an important security feature that was the basic impersonation attack under public key replacement attack. As well as, it mounted a specific attack on the protocol. Then an improved certificateless two-party authenticated key agreement protocol was presented improved protocol can security properties. in order to satisfy efficiently withstand the missing public key security property. replacement attack The analysis shows that the and satisfy some necessary security properties.
作者 张全领 陆阳
出处 《信息技术》 2015年第7期1-4,8,共5页 Information Technology
基金 国家自然科学基金项目(61272542)
关键词 无证书密码体制 认证密钥协商协议 公钥替换攻击 基本伪装攻击 双线性对 certificateless cryptography authenticated key agreement protocol public key replacement attack basic impersonation attack bilinear pairings
  • 相关文献

参考文献15

  • 1Diffie W, Hellman M. New directions in cryptography [ J ]. IEEE Transactions on Information Theory, 1976, 22 (6) :644 - 654.
  • 2Shamir A. Identity-based eryptosystems and signature schemes[ C ]// Advances in Cryptology CRYPTO 84, LNCS 196. Berlin: Springer- Verlag, 1984:47-53.
  • 3AL-Riyami S S, Paterson K G. Certificateless public key cryptogra- phy [ C ] ///Asiacrypt 03, LNCS 2894. Berlin : Springer-Verlag, 2003 : 452 -473.
  • 4Swanson C, David J. A study of two-party certificateless authentica- ted key-agreement protocols [ C ] //Proceedings of INDOCRYPT 2009. LNCS 5922. Berlin : Springer-Verlag, 2009:57 - 71.
  • 5Lippold G, Boyd C, Nieto J. Strongly secure certifieateless key agreement[ C]//Proceeding of the Pairing 2009. LNCS 5671. Ber- lin, Heidelberg: Spfinger-Verlag, 2009:206-230.
  • 6SHI Yijuan LI Jianhua.Two-Party Authenticated Key Agreement in Certificateless Public Key Cryptography[J].Wuhan University Journal of Natural Sciences,2007,12(1):71-74. 被引量:23
  • 7Mandt T, Tan C. Certifieateless authenticated two-party key agree- ment protocols [ C ] // Proceedings of the ASIAN 2006. LNCS,4435. Springer-Verlag, 2008:37 -44.
  • 8Zhang L, Zhang F, Wu Q, et al. Simulatable eertificateless two-par- ty authenticated key agreement protocol [ J ]. Information Sciences, 2010,180:1020 - 1030.
  • 9Yang G, Tan C. Strongly secure certificateless key exchange without pairing [C]//6th ACM Symposium on information, Computer and Communications Security, 2011:71 - 79.
  • 10He D, Chen J, Hu J. A pairing-free certificateless authenticated key agreement protocol [ J ]. International Journal of Communica- tion Systems, 2012, 25(2) : 22l -230.

二级参考文献10

  • 1SHAOZu-hua.Efficient Authenticated Key Agreement Protocol Using Self-Certified Public Keys from Pairings[J].Wuhan University Journal of Natural Sciences,2005,10(1):267-270. 被引量:12
  • 2Cheng Z H,Comley R.Efficient Certificateless Public Key Encryption. http://eprint.iacr.org/ 2005/012.pdf . 2005
  • 3Barua R,Dutta R,Sarkar P.Extending Joux’s Protocol to Multi Party Key Agreement. http: //eprint.iacr.org/2003/062.pdf . 2003
  • 4Cheng Z H,,Comley R,Vasiu L.Remove Key Escrow from the Identity-Based Encryption System[].Foundations of Information Technology in the Era of Network and Mobile Computing.2004
  • 5Al-Riyami S S,,Paterson K G.Certificateless Public Key Cryptography[].Lecture Notes in Computer Science.2003
  • 6Yum D H,,Lee P J.Generic Construction of Certificateless Encryption[].Lecture Notes in Computer Science.2004
  • 7Al-Riyami S S,,Paterson K G.CBE from CL-PKE: A Generic Construction and Efficient Schemes[].Lecture Notes in Computer Science.2005
  • 8Chen L,Kudla C.Identity Based Authenticated Key Agreement from Pairings. http: //eprint.iacr.org/2002/184.pdf . 2002
  • 9Yum D H,Lee P J.Generic Construction of Certificateless Signature[].Lecture Notes in Computer Science.2004
  • 10张磊,张福泰.一类无证书签名方案的构造方法[J].计算机学报,2009,32(5):940-945. 被引量:44

共引文献41

同被引文献12

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部