期刊文献+

基于身份的多方认证组密钥协商协议 被引量:4

ID-based Multi-Party Authenticated Key Agreement Protocols Using Multilinear Forms
下载PDF
导出
摘要 2002年,Boneh和Silverberg提出了多线性表理论和基于多线性表的多方Diffe-Hellman密钥交换协议,H.K.Lee等人在该协议基础上利用证书对参与者进行身份认证,解决了该协议容易遭受中间人攻击的问题,H.M.Lee等人进一步引入基于身份的公钥密码技术替代数字证书,提高了密钥协商的效率,形成了ID-MAK协议.在本文中,我们对ID-MAK协议进行了安全性分析,发现ID-MAK协议没有真正实现它所宣称的身份认证,不能抵御主动攻击,敌手可冒充任意合法成员参与到密钥协商中获取组密钥.本文在计算多线性D-H问题假设下提出了两个ID-MAK协议改进方案,两个改进协议只需一轮即可协商一个组密钥,本文还给出了相应的成员动态变化和组密钥更新协议.本文最后对我们改进的协议进行了安全性分析. In 2002,Boneh and Silverberg presented theory of multilinear forms and a multi-party Diffe-Hellman key agreement protocol using mulfilinear forms. H.K.Lee et al adopted certificates to authenticate group members and protect against middleman attacks in this protocol. Subsequently,H.M.Lee et al deployed ID-base public keys other than certificates in the MAK protocol, and presented the ID-MAK protocol. Owing to simplicity of ID-base public keys,the ID-MAK Protocol is more effficient. In this paper, we analyze the security of the ID-MAK protocol, and have found that the ID-MAK protocol doesn' t really authenticate group members as claimed. Thus it cannot resist active attacks, and an adversary can pretend to be a legal member to obtain the group key. Based on the computational multilinear Diffe-Hellrnan assumption, we present two improved schemes to the ID-MAK protocol to remove this security defect. Both our improved protocols need only one round agreement. They support dynamic member change and key refresh. Our security analysis shows that they are secure.
作者 钟欢 许春香
出处 《电子学报》 EI CAS CSCD 北大核心 2008年第10期1869-1872,1890,共5页 Acta Electronica Sinica
基金 现代通信国家重点实验室基金(No.9140C1107010604) 华为公司科技基金(No.YJCB2006053DC) 计算机网络与信息安全教育部重点实验室基金
关键词 多方密钥协商 认证 基于身份的公钥 多线性表 multi-party key agreement authentication ID-base public keys multilinear forms
  • 相关文献

参考文献13

  • 1Steiner M, Tsudik G, Waidner M. Key agreement in dynamic peer groups[J]. IEEE Transactions on Parallel and Distribution System, 2000,11 (8) : 769 - 780.
  • 2Burmester M, Desmedt Y. A secure and efficient conference key disuibution system[ A]. In Advance in Cryptology EUROCRYPT' 94 [ C ]. Berlin: Springer- Verlag, 1994.275 - 286.
  • 3Becker K, Wille U. Communication complexity of group key distribution[ A]. In ACM conference on Computer and Communication Security[ C]. New York: ACM Press, 1998.1 - 6.
  • 4Ateniese G, Steiner M, Tsudik G. New multiparty authentication services and key agreement protocols[J]. IEEE Journal on Selected Areas in Communications, 2000,18(4) :628 - 640.
  • 5Boneh D, Franklin M. Identity-based Encryption from the weil Pairing[A]. In Proceedings of Crypto' 2001 [C]. Berlin: Springer- Verlag, 2001.213 - 229.
  • 6Joux A. One round protocol for tripartite Diffie-Hellman[ A ]. Proceedings of Algorithmic Number Theory Symposium[ C]. Berlin: Springer-Vedag,2000.385 - 394.
  • 7Smart N P. An Identity based authenticated Key Agreement protocol based on the Weil Pairing. Cryptography [R/OL ]. eprint Archive, http://eprint. iacr. org/2001/111.
  • 8Boneh D,Franklin M. Identity-based encryption from the Weil Pairing[ A ]. Advances in Cryptography-CRYPTO 2001 [C]. Berlin: Springer-Vedag, 2001:213 - 229.
  • 9Cocks C. An Identity based encryption scheme based on quadratic residues[ A]. Advances in Cryptography and Coding[ C ]. Berlin: Springer-Verlag, 2001. 360 - 363.
  • 10Sattam S, Kenneth A. Parterson G. Authenticated Three Party Key Agreement Protocols from Pairings[ OL ]. http://eprint. iacr. org/2002/035.

同被引文献31

  • 1王宇,卢均,吴忠望.空间信息网络的组密钥管理[J].宇航学报,2006,27(3):553-555. 被引量:10
  • 2张串绒,肖国镇.基于签密技术的可认证密钥协商协议[J].空军工程大学学报(自然科学版),2006,7(6):65-67. 被引量:4
  • 3KIM Y,PERRG A,TSUDIK G.Tree-based group Diffie-Hellman protocol[J].ACM Transactions on Information and System Security,2004,7(1):60-96.
  • 4AHMED A H,ALI M,LUIS O B.Authenticated group key agreement protocols for ad hoc wireless networks[J].International Journal of Network Security,2007,4(1):90-98.
  • 5KOBLITZ P,MENEZES E,VANSTONE S.The state of elliptic curve cryptography[J].Designs,Codes and Cryptography,2000,19:173-193.
  • 6BARRETO P,KIM H,LYNN B,et al.Efficient algorithms for pairing-based cryphosystems[A].CRYPTO2002[C].California,USA,2002.354-368.
  • 7WANG K,ZHAO Z W,YAO L.An agile reconfigurable key distribution scheme in space information network[A].IEEE Conference on Industrial Electronics and Applications[C].Harbin,China,2007.2742-2747.
  • 8HU S B,MENG X.Classification and key management approaches for space networks security[A].International Conference on Anti-counterfeiting,Security and Identification[C].Guiyang,China,2008.124-127.
  • 9STEINER M,TSUDIK G,WAIDNER M.Key agreement in dynamic peer groups[J].IEEE Transactions on Parallel and Distributed System,2000,11(8):760-780.
  • 10KIM Y,PERRG A,TSUDIK G.Communication efficient group key agreement[A].Proceedings of IFIP SEC2001[C].Heidelberg,Germany,2001.229-244.

引证文献4

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部