期刊文献+

动态对等群上的基于身份的认证密钥协商协议

ID-Based Authenticated Key Agreement Protocol in Dynamic Peer Groups
下载PDF
导出
摘要 针对DB08协议(Dutta和Barua的动态群密钥协商协议)不满足密钥独立性的缺陷,利用SK(Sakai和Kasahara)的密钥构造方法,提出了一个动态对等群上的基于身份的认证密钥协商协议.在新协议中计算子密钥时,利用Hash运算和增加会话标识,来避免不同会话中子密钥的关联性,因此新协议满足密钥独立性.同时新协议满足完善的前向安全性、主密钥前向安全性,以及抗主动和被动攻击等安全性.与DB08协议相比较,新协议大大降低了计算开销和通信开销,因此更适用于动态的对等网络. The two round dynamic group key agreement protocol (DB08 protocol) proposed by Dutta and Barua doesn't provide key independence. To improve DB08 protocol, an ID-based authenticated key agreement protocol in dynamic peer groups is presented by using Sakai R and Kasahara M's key construction. To avoid the correlation of the sub-keys for different sessions, hash functions and session identifiers are included while computing the sub keys in the new protocol. So the new protocol achieves key independence, and it provides perfect forward secrecy, KGC-forward secrecy and resistance to passive and active attacks as well. Compared with DB08 protocol, the computation and communication costs are greatly reduced in the new protocol. So the new protocol is more efficient and applicable for dynamic peer network.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2008年第5期583-587,共5页 Journal of Wuhan University:Natural Science Edition
基金 国家自然科学基金(60473028 60603010) 陕西省自然科学基金资助项目(2006F19)
关键词 认证密钥协商 密钥独立性 完善前向安全性 主密钥前向安全性 对等网络 authenticated key agreement key independence perfect forward secrecy KGC-forward secrecy peer network
  • 相关文献

参考文献11

  • 1Ingemarsson I, Tang D T, Wong C K. A Conference Key Distribution System[J]. IEEE Transactions on Information Theory, 1982,28 (5) : 714-720.
  • 2Steer D, Strawczynki L, Diffie W, et al. A Secure Audio Teleconference System[ C]//Advances in CryptologyCRYPTO'88 (LNCS 403). Berlin:Springer-Verlag, 1990:520-528.
  • 3Steiner M, Tsudik G, Waidner M. Key Agreement in Dynamic Peer Groups[J].IEEE Transactions on Parallel and Distributed Systems, 2000,11 (8) : 769-780.
  • 4Ateniese G,Steiner M,Tsudik G. Authenticated Group Key Agreement and Friends [C]//Proceedings of the 5th ACM Conference on Corn puter and Communica tions Security. NewYork : ACM Press, 1998 : 17-26.
  • 5Steiner M,Tsudik G,Waidner M. Diffie-Hellman Key Distribution Extended to Groups[C]//SIGSAC: Proceedings of the 3rd ACM Conference on Computer and Communications Security. New York: ACM Press, 1996:31-37.
  • 6Burmester M,Desmedt Y. A Secure and Efficient Conference Key Distribution System [C]//Advances in Cryptolgy-EUROCRYPT' 94 (LNCS 950). Berlin: Springer-Verlag, 1995:275-286.
  • 7Dutta R, Barua R. Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting[J]. IEEE Transactions on Information Theory, 2008,54(5) : 2007-2025.
  • 8TeoJ C M,Tan C H,Ng J M. Security Analysis of Provably Secure Constant Round Dynamic Group Key Agreement [J].IEICE Trans Fundamentals, 2006, E89-A(11) : 3348-3350.
  • 9Sakai R, Kasahara M. ID Based Cryptosystems with Pairing on Elliptic Curve Cryptology[EB/OL]. [2008- 01-25]. http://eprint, incr. org/2003/054.
  • 10Zhang Fangguo,Safavi-Naini R, Susilo W. A Efficient Signature Scheme from Bilinear Pairings and Its Applications [C]//Public Key Cryptography-PKC 2004. Berlin : Springer-Verlag, 2004 : 277-290.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部