期刊文献+

一种抗阻断攻击的认证组密钥协商协议 被引量:1

An Authenticated Group Key Management Protocol Withstand Interrupted Attack
下载PDF
导出
摘要 一个非认证的组密钥协商协议不能对通信参与者和消息进行认证,它必须依赖认证的网络信道或其它的认证方法。分析了Burmester等人在认证广播信道下提出的著名组密钥协商协议,指出它不能抵抗内部恶意节点发起的密钥协商阻断攻击,该攻击导致组内其它诚实节点不能正确计算出一致的组密钥。提出了一种改进的认证的组密钥协商协议,在原协议中加入了消息正确性的认证方法,能够对组内恶意节点进行检测,并在随机预言模型下证明了改进的协议能够抵抗密钥协商阻断攻击。 A non-authenticated group key agreement protocol cannot provide participant and message authentication, thus it must depend on an authenticated network channel or use another scheme to provide authentication. This paper indicates that Burrnester et al. 's group key agreement protocol which based on the authenticated broadcast channel is unable to withstand the disruption attack of malicious participants in group. This attack leads that other honest participants will not be able to correctly agree on a group key consistently. In this paper, an improved protocol is proposed. The proposed protocol which joins the message authentication method in original protocol can detect the malicious participant. Under the random oracle model, paper proves the improved protocol can withstand the interrupted attack from malicious participant.
出处 《计算机科学》 CSCD 北大核心 2008年第1期77-79,共3页 Computer Science
基金 国家自然科学基金资助 项目编号60403027 湖北省教育厅优秀中青年基金资助 项目编号Q200629001
关键词 密钥管理 组密钥协商 离散对数问题 阻断攻击 Key management, Group key agreement, Discrete logarithm problem, Interrupted attack
  • 相关文献

参考文献9

  • 1Sandro R, David H. A Survey of Key Management for Secure Group Communication [J]. ACM Computing Surveys, 2003,35 (3) :309-329.
  • 2Challal Y, Seba H. Group key management protocols: a novel taxonomy [J]. International Journal of Information Technology, 2005,2(2): 105-118.
  • 3Burmester M, Desmedt Y. A secure and efficient conference key distribution system [C]. Eurocrypt ' 94, Italy, LNCS 950, Springer-Verlag, Berlin, 1994. 275-286.
  • 4Horng G. An efficient and secure protocol for multi-party key establishment [J]. Computer Journal, 2001, 44:463-470.
  • 5Ateniese G, Steiner M, Tsudik G. New multiparty authentication services and key agreement protocols [J]. IEEE Journal Sel. Area. Comm , 2000, 18:628-639.
  • 6Boyd C, Nieto G. Round-optimal contributory conference key agreement [C]. In: Proc. Public-Key Cryptography' 03, USA, LNCS 2567, Springer-Verlag, Berlin,2003. 161-174.
  • 7Bresson E, Chevassut O, Pointeheval D. Dynamic group DiffieHellman key exchange under standard assumptions [C]. Advances in Cryptology-Proc. Euroerypt 2002, Netherlands, LNCS 2332, Springer-Verlag, Berlin, 2002. 321-336.
  • 8Bellare M, Rogaway P. Random oracles are practical: a paradigm for designing efficient protocols [C]. ACM CCS' 93, ACM Press, New York, 1993.62-73.
  • 9Schnorr C P. Efficient signature generation for smart cards [J]. Journal of Cryptology, 1991,4(3) : 161-175.

同被引文献10

  • 1SANDRO R, DAVID H. A survey of key management for secure group communication[J]. CAM Computing Surveys, 2003, 35(3): 309-329.
  • 2CHALLAL Y, SEBA H. Group key management protocols: a novel taxonomy[J]. International Journal of Information Technology, 2005,2(2): 105-118.
  • 3BURMESTER M, DESMEDT Y. A secure and efficient conference key distribution system[A]. Euocrypt'94, Italy, LNCS 950[C]. Springer-Verlag, Berlin, 1994. 275-286.
  • 4BONEH D, FRANKLIN M. Identity-based encryption from the weil pairing[A]. Advances in Cryptology-Crypto 2001[LNCS 2139][C]. Springer-Verlag, 2001.231-229.
  • 5BURMESTER M, DESMEDT Y. A secure and scalable group key exchange system[J]. Information Processing Letters, 2005, 94(3): 137-143.
  • 6MENEZES A J, OKAMOTO T, VANSTONE S A. Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field[J]. IEEE Transactions on Information Theory, 1993, 39(5): 1639-1646.
  • 7MAURER U, WOLF S. The Diffie-Hellman protocol[J]. Designs, Codes and Cryptography, 2000, 19: 147-171.
  • 8KOBLITZ N, MENEZES A. Pairing-based cryptography at high security levels[A]. Cryptography and Coding 2005, LNCS 3796[C]. Springer-Verlag, 2005. 13-36.
  • 9BARRETO P S L M, KIM H Y, LYNN B, et al. Efficient algorithms for pairing-based crypto systems[A]. Advances in Crypto 2002[LNCS 2442][C]. Springer-Verlag, 2002. 354-369.
  • 10BONEH D, LYNN B, SHACHAM H. Short signatures from the wail pairing[A]. Advances in ASIACRYPT 2001[LNCS 2248][C]. Springer-Verlag, 2001.514-532.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部