摘要
目前提出的密钥协商协议大部分都是基于Diffie-Hellman交互,对协商信息进行认证,并在成员之间建立一个会话密钥,实施安全通信。本文找出了文献[1]中的两个安全漏洞,利用双线性映射性质,提出了一种基于用户ID的会议密钥协商方案。此方案能够有效地抵抗重放攻击、合谋攻击、假冒攻击、中间人攻击,与文献[1]的方法相比,具有更高的安全性和效率,在多对多网络通信中有着很强的实用性。
Most published key agreement protocols are based on the Diffie-Hellman key agreement, which enables all parties to establish a session key and communicate securely. In the conference key agreement system, the agreement informa- tion needs to be authenticated. In this paper,we find out two leaks of literature [1], and then propose an ID-based confer- ence key agreement scheme from pairings. The proposed scheme is secure against replaying attacks, conspiratorial imper- sonation attacks, impersonation attacks and man-in-the-middle attacks. Compared to [1], it has better security, efficiency, and practicability in the multi-party communications through the network.
出处
《计算机工程与科学》
CSCD
2007年第12期7-10,32,共5页
Computer Engineering & Science
基金
国家自然科学基金资助项目(60403027)
关键词
会议密钥协商
双线性映射
基于身份
conference key agreement
bilinear pairings map ID-based