期刊文献+

基于身份和三叉树的可认证群密钥协商方案 被引量:1

An Authenticated Identity and Triple Tree Based Group Key Agreement Scheme
下载PDF
导出
摘要 将基于身份的密码机制和三叉树引入到群密钥协商中,提出了一种高效的基于身份的可认证的群密钥协商方案。该方案不依赖数字证书提供认证,计算开销降低到O(log3n)。群长期密钥的引入以及群密钥中长期密钥和临时密钥的结合,使得该方案提供了密钥独立、完善前向保密和隐含密钥认证等安全属性。文章的设计思想可以作为把可认证的两方和三方密钥协商协议扩展到多方的一种通用方法。 Identity-based Encryption and triple tree are introduced into group key agreement schemes.An efficient authenticated identity and triple tree based group key agreement scheme is proposed.The scheme provides authentication independent of digital certification and its computational cost is reduced to O(log3n).The scheme provides key independence,perfect forward secrecy and implicit key authentication because of the introduction of group long-term key and the combination of long-term and short-term keys in the group key.The idea of this paper can be used as a general method to extend authenticated two-party and three-party key agreement protocols to group settings.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第24期134-137,共4页 Computer Engineering and Applications
基金 国家自然科学基金(编号:60203012)
关键词 群密钥协商 隐含密钥认证 三叉树 基于身份的密码机制 group key agreement,implicit key authentication,triple tree,identity-based encryption
  • 相关文献

参考文献7

  • 1Perrig A.Efficient collaborative key management protocols for secure autonomous group communication[C].In:M Blum,C H Lee ed.International Workshop on Cryptographic Techniques and E-Commerce, Hong Kong:City University of Hong Kong Press.1999:192-202.
  • 2Joux A.A One Round protocol for tripartite Diffie-Hellman[C].In: Algorithmic Number Theory, 4th International Symposium, Leiden : Springer-Verlag, 2000 : 385-393.
  • 3Kim Y,Tsudik G.Communication-efficient Group Key Agreement[C]. In:The New Decade Challenge,Sixteenth Annual Working Conference on Information Security, Paris : Kluwer, 2001 : 229-244.
  • 4AI-Riyami S S,Paterson K G.Authenticated three party key agreement protocols from pairings.http://eprint.iacr.org/2002/035/.
  • 5Bresson E,Chevassut O,Pointcheval D.Provably Authenticated Group Diffie--Hellman Key Exchange--The Dynamic Case[C].In:The 7thInternational Conference on theand Information Security, GoldTheory and Application of CryptologyCoast : Springer-Verl ag, 2001 : 290-309.
  • 6Reddy K C,Nalla D.Identity Based Authenticated Group Key Agreement Protocol[C].In:Third International Conference on Cryptology in India, Hyderabad : Springer-Verlag, 2002 : 215-233.
  • 7Joux A.The Weil and Tate Pairings as building blocks for public key cryptosystems[C].In:Agorithmic Number Theory,5th International Symposium, Sydney :Springer-Verlag, 2002 : 20-32.

同被引文献5

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部