期刊文献+

基于身份的认证密钥协商协议的安全分析与改进 被引量:23

Analysis and improvement of an ID-based authenticated key agreement protocol
下载PDF
导出
摘要 对基于身份的标准模型下可证明安全的认证密钥协商协议进行安全性分析,发现恶意的密钥生成中心(PKG,private key generator)能计算出所有的会话密钥,即它在无会话密钥托管模式下不满足PKG前向安全性。因此,为满足无托管的要求,提出一个改进的基于身份的认证密钥协商协议,并在标准模型下证明其为安全的认证密钥协商协议。结果表明,改进后协议满足完善前向安全性和PKG前向安全性。 The security of a recently proposed ID-based authenticated key agreement protocol was analyzed. Although it is provably secure in the standard model, a malicious PKG (private key generator) can still obtain all of the agreed session keys, that is, it doesn't provide PKG-forward secrecy in escrowless mode. To satisfy the security requirement in escrowless mode, an improved version of the protocol was presented and it was proved to be a secure authenticated key agreement in the standard model. Results show that it provides perfect forward secrecy and PKG-forward secrecy.
出处 《通信学报》 EI CSCD 北大核心 2008年第12期16-21,共6页 Journal on Communications
基金 国家自然科学基金资助项目(60473028,60603010) 陕西省自然科学基金资助项目(2006F19)~~
关键词 基于身份的认证密钥协商 完善前向安全性 PKG前向安全性 标准模型 ID-based authenticated key agreement perfect forward secrecy PKG-forward secrecy standard model
  • 相关文献

参考文献17

  • 1DIFFIE W, HELLMAN M E. New directions in cryptography[J]. IEEE Trans Info Theory, 1976, 22(6): 44-654.
  • 2SHAMIR A. Identity-based cryptosystems and signature schemes[A]. Advances in Cryptology---Crypto'84[C], Berlin: Springer-Verlag, 1984.47-53.
  • 3OKAMOTO E. Proposal for identity-based key distribution system[J]. Electron Letters, 1986, 22: 1283-1284.
  • 4TANAKA K, OKAMOTO E. Key distribution system for mail systems using D-related information directory[J]. Computer Security, 1991, 10:5-33.
  • 5BONEH D, FRANKLIN M. Identity based encryption from the Weft pairing[A]. Advances in Cryptology---Crypto 2001[C]. Berlin: Springer- Verlag, 2001.213-229.
  • 6SMART N E An identity based authenticated key agreement rotocol based on the Weil pairing[J]. Electro Letters, 2002, 38:30-632.
  • 7XUN Y. Efficient ID-based key agreement from the Weil pairing[J]. IEE Electronics Letters, 2003, 39(2): 206-208.
  • 8SHIM K. Efficient ID-based authenticated key agreement protocol based on the Well pairing[J].IEE Electronics Letters,2003, 39(8): 653-654.
  • 9SUN H, HSIEH B. Security analysis of Shim's authenticated key agreement protocols from pairings[EB/OL], http://eprint.iacr.org/2003/113.
  • 10MCCULLAGH N, BARRETO E A new two party identity-based authenticated key agreement[A]. Proceedings of the RSA Conference 2005[C]. Berlin: Springer-Verlag, 2005.262-274.

二级参考文献26

  • 1Blake-Wilson S,Menezes A.Authenticated Diffie-Hellman key agreement protocols//Proceedings of the SAC' 98,Lecture Notes in Computer Science 1556.Berlin:Springer-Verlag,1999:339-361.
  • 2Diffie W,Hellman M E.New directions in cryptography.IEEE Transactions on Information Theory,1976,22 (6):644-654.
  • 3Shamir A.Identity-based cryptosystems and signature schemes//Proceedings of the CRYPTO'84,Lecture Notes in Computer Science 196.Berlin:Springer-Verlag,1984:47-53.
  • 4McCullagh N,Barreto P S L M.A new two-party identitybased authenticated key agreement//Proceedings of the CTRSA'05,Lecture Notes in Computer Science 3376.Berlin:Springer-Verlag,2005:262-274.
  • 5Boneh D,Franklin M.Identity-based encryption from the Weil pairing//Proceedings of the CRYPTO' 01,Lecture Notes in Computer Science 2139.Berlin:Springer-Verlag,2001:213-229.
  • 6ElGamal T.A public key cryptosystem and signature scheme based on discrete logarithms.IEEE Transaction on Information Theory,1985,31(4):469-472.
  • 7Smart N.An ID-based authenticated key agreement protocol based on the Weil pairing.Electronic Letters,2002,38(13):630-632.
  • 8Shim K.Efficient ID-based authenticated key agreement protocol based on Weil pairing.Electronic Letters,2003,39(8):653-654.
  • 9Chen L,Kudla C.Identity based key agreement protocols from pairings//Proceedings of the 16th IEEE Computer Security Foundations Workshop.Los Alamitos,California:IEEE Computer Society,2002:219-213.
  • 10Ryu E K,Yoon E J,Yoo K Y.An efficient ID-based authenticated key agreement protocol from pairings//Proceedings of the NETWORKING'04,Lecture Notes in Computer Science 3042.Berlin:Springer-Verlag,2004:1458-1463.

共引文献41

同被引文献172

引证文献23

二级引证文献69

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部