期刊文献+

一种基于身份的会议密钥协商方案 被引量:1

A Secure and Effective ID-Based Conference Key Agreement Scheme
下载PDF
导出
摘要 目前提出的密钥协商协议大部分都是基于Diffie-Hellman交互,对协商信息进行认证,并在成员之间建立一个会话密钥,实施安全通信。本文找出了文献[1]中的两个安全漏洞,利用双线性映射性质,提出了一种基于用户ID的会议密钥协商方案。此方案能够有效地抵抗重放攻击、合谋攻击、假冒攻击、中间人攻击,与文献[1]的方法相比,具有更高的安全性和效率,在多对多网络通信中有着很强的实用性。 Most published key agreement protocols are based on the Diffie-Hellman key agreement, which enables all parties to establish a session key and communicate securely. In the conference key agreement system, the agreement informa- tion needs to be authenticated. In this paper,we find out two leaks of literature [1], and then propose an ID-based confer- ence key agreement scheme from pairings. The proposed scheme is secure against replaying attacks, conspiratorial imper- sonation attacks, impersonation attacks and man-in-the-middle attacks. Compared to [1], it has better security, efficiency, and practicability in the multi-party communications through the network.
出处 《计算机工程与科学》 CSCD 2007年第12期7-10,32,共5页 Computer Engineering & Science
基金 国家自然科学基金资助项目(60403027)
关键词 会议密钥协商 双线性映射 基于身份 conference key agreement bilinear pairings map ID-based
  • 相关文献

参考文献11

  • 1Kim Jeung-Seop, Kim Hyo-Chu, Ha Kyeoung-Ju, et al. One Round Identity-Based Authenticated Conference Key Agreement Protocol[A]. Proe of ECUMN'04[C]. 2004. 407-416.
  • 2Berkovits S. How to Broadcast a Secret[A]. Proc of Eurocrypt' 91[C]. 1991.
  • 3Mao J, Yang B. Anonymous and Dynamic Conference-Key Distribution System[A]. Proe of the 14th IEEE 2003 Int'1 Syrup on Personal, Indoor and Mobile Radio Communication [C]. 2003. 2784-2788.
  • 4Li Shiqun, Chen Kefei, Li Xiangxue, et al. Identity Based Conference Key Distribution Scheme from Parings[A]. Proc of ICCNMC'05[C]. 2005. 845-852.
  • 5Burmester M,Desmedt Y. A Secure and Efficient Conference Key Distribution System [A]. Proc of Eurocrypt' 94 [C]. 1995. 257-286.
  • 6Boyd C. Nieto J M O. Round-Optimal Contributory Conference Key Agreement[A]. Proc of PKC' 03[C]. 2003. 161- 174.
  • 7Tzeng W G. A Secure Fault-Tolerant Conference-Key Agreement Protocol[J]. IEEE Trans on Computers, 2002, 51 (4) : 373-379.
  • 8Shamir A. Identity-Based Cryptosystems and Signature Schemes [A]. Proc of Cryptology-Crypto'84[C]. 1985.47-53.
  • 9Boneh D, Franklin M. Identity-Based Encryption from the Weil Pairing[A]. Proc of Cryptology-Crypto ' 01 [C]. 2001. 213-219.
  • 10Paterson K G. ID-Based Signatures from Pairings on Elliptic Curves[EB/OL]. http://eprint. iaer. org,2005-12.

同被引文献5

  • 1Koopman,Philip.Embedded system security[J].Computer,2004(37)7:95-97.
  • 2Tzvetkov,Vesselin.Disaster coverable PKI model based on Majority Trust principle.International Conference on Information Technology:Coding Computing,ITCC,v2,International Conference on Information Technology:Coding Computing[J].ITCC,2004(2):118-119.
  • 3Kent S,Atkinson R.Security architecture for the internet protocol[M].RFC2401,1998.
  • 4Bruce Schneier.Applied Crytography Second Edition:protocol,algorithms,and source code in C[M].John Wiley & Sons,Inc,1996.
  • 5向文,陶良升,王同洋.一种高效的WTLS握手协议[J].计算机应用,2008,28(11):2798-2800. 被引量:5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部