期刊文献+

基于身份的安全密钥交换方案 被引量:1

Efficient identity-based key agreement protocols with required security
下载PDF
导出
摘要 针对此前提出的一轮密钥交换方案都不满足密钥控制安全性的问题,提出了一个新的基于身份的密钥交换方案。新方案将两个基础密钥交换方案组合,并通过密钥管理中心转发密钥元素,有效地避免了密钥控制,并且每次生成会话密钥一次配对运算,效率比此前的基于身份的密钥交换方案有很大的提高。 Because none of the exit one-round identity-based key agreement protocols satisfies key control attribute,a new one- round identity-based key agreement protocol is proposed.The new protocol originates from two basic protocols.To satisfy key control attribute,the key components are transmitted by KGC.The new protocol,which only needs one pairing,is more efficient than other identity-based key agreement protocols.
作者 戢伟 辛小龙
机构地区 西北大学数学系
出处 《计算机工程与应用》 CSCD 北大核心 2008年第23期120-122,共3页 Computer Engineering and Applications
基金 陕西省自然科学基金(No.2007A19)~~
关键词 基于身份 密钥交换 双线性对 椭圆曲线 identity-based key agreement protocol bilinear pairing elliptic curves
  • 相关文献

参考文献4

  • 1Smart N P.An identity based authenticated key agreement protocol based on the weil pairing [J].Electronics Letters, 2002,38 ( 13 ) : 630 - 632.
  • 2Shim K.Efficient ID-based authenticated key agreement protocol based on well pairing[J].Electronies Letters, 2003,39(8 ) : 653-654.
  • 3Chen L,Kudla C.Identity based authenticated key agreement protocols from palrings[J].Computer Security Foundations Workshop,2003: 219-233.
  • 4Choie Y J,Jeong E,Lee E.Efficient identity-based authenticated key agreement protocol from pairings[J].Applied Mathematics and Computation, 2005,162( 1 ) : 179-188.

同被引文献7

  • 1Waidner M,Pfitzmann B.The dining cryptographers in the disco:unconditional sender and recipient untraceability with computationally secure serviceability[C]//Lecture Notes in Computer Science 434:Advances in Cryptology-Eurocrypt' 89,1989.
  • 2van Heyst E,Pedersen T P.How to make efficient Fail-stop signatures[C]//Advances in Cryptology-Eurocrypt'92,1992:366-377.
  • 3Susilo W.Short Fail-stop signature scheme based on factorization and discrete logarithm assumptions[J].Theoretical Computer Science,2009 (401):736-744.
  • 4Chang H K C.Fail-stop blind signature scheme design based on pairings[J].Applied Mathematics and Computation,2005(169):1324-1331.
  • 5Chung Y F,Huang K H.ID-based signature scheme on the elliptic curve cryptosystem[J].Computer Standards & Interfaces,2007,(29):601-604.
  • 6冯登国 裴定一.密码学导引[M].北京:科学出版社,2001.230-231.
  • 7杨青,辛小龙,戢伟.基于椭圆曲线的数字签名和代理数字签名[J].计算机工程,2008,34(23):147-149. 被引量:11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部