期刊文献+

基于自证明公钥和零知识证明的身份认证协议 被引量:3

Authentication Protocol Based on Self-certified Public Key and Zero-knowledge Proof
下载PDF
导出
摘要 在分析几种典型零知识身份认证协议的基础上,利用Girault自证明公钥原理、结合椭圆曲线公钥密码的优点提出一种基于自证明公钥和零知识证明的身份认证协议,并为协议增加了密钥协商功能。分析表明该方案具有较高的安全性,与同类方案相比,该方案对存储空间、网络通信量和计算开销的要求较低,有较高的效率。 Based on the analysis of several typical zero-knowledge proof authentication protocols, this paper presents an authentication protocol with key-exchange function based on self-certified public key and zero-knowledge proof, which combines Girault's self-certified public key theory and the advantages of ECC. Analysis show that the scheme has higher security. Compared with the congeneric schemes, the proposed scheme is more efficient and has advantages in storage, communication overheads and computation cost.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第12期111-113,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2006AA701416 2007AA701309)
关键词 自证明 零知识证明 身份认证 self-certified zero-knowledge proof authentication
  • 相关文献

参考文献5

  • 1Schnorr C P. Efficient Identification and Signatures for Smart Cards[C]//Proceedings of CRYPTO'89. [S. l.]: Spriger-Verlag, 1990: 235-251.
  • 2Almuhammadi S, Neuman C. Security and Privacy Using One-round Zero-knowledge Proofs[C]//Proceedings of the 7th IEEE International Conference on E-commerce Technology. Los Angeles, CA, USA: IEEE Press, 2005: 435-438.
  • 3张虎强,洪佩琳,李津生,熊继平.一种零知识证明协议的安全分析与改进[J].信息安全与通信保密,2006,28(11):163-166. 被引量:4
  • 4Girault M. Self-Certified Public Keys[C]//Proceedings of ENROCRYPT'91. [S. l.]: Springer-Verlay,1992: 490-497.
  • 5邱成刚,李方伟,谭利平.基于双线性对和公钥自证明的认证加密方案[J].重庆邮电大学学报(自然科学版),2007,19(5):610-612. 被引量:2

二级参考文献13

  • 1MAChun-guang CAIMan-chun YANGYi-xian.Stateless Transitive Signature Schemes[J].The Journal of China Universities of Posts and Telecommunications,2004,11(4):43-47. 被引量:1
  • 2[1]Almuhammadi S,NeumanC.Security and Privacy Using One-Round Zero-Knowledge Proofs.Proceedings of the Seventh IEEE International Conference on E-Commerce Technology,2005,CEC' 05:435-438.
  • 3[2]AlmuhammadiS,Sui N T,McLeod D.Better Privacy and Security in E-Commerce:Using Elliptic Curve-Based Zero-Knowledge Proofs.Proceedings of the IEEE International Conference on E-Commerce Technology,2004,CEC'04:299-302.
  • 4[3]BarakB,LindellY,VadhanS.Lower Bounds for Non-Black-Box Zero Knowledge.Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science (FOCS' 03),2003;,OCS' 03:384-393.
  • 5[4]Zhang Dalu,Liu Min,Yang Zhe.Zero-knowledge proofs of identity based on ELGAMAL on conic.Proceedings of the IEEE International Conference on ECommerce Technology for Dynamic E-Business (CECEast' 04),2004,CEC-East' 04:216-223.
  • 6[6]SchneierB.Applied Cryptography Protocols,algorithms,and source code in C(second Edition).北京:机械工业出版社,2000:361-368.
  • 7[1]NYBERG K,RUEPPEL R A.Message recovery for signature schemes based on the discrete logarithm problem[C]// DE SANTIS A.Advances in Cryptology-EUROCRYPT'94,Lecture Notes in Computer Science(LNCS 950),Berlin:Springer-Verlag,1995:182-193.
  • 8[2]LEE W B,CHANG C C,YANG W P.Authenticated encryption schemes without using it one way function[J].Electron letter.1995,31(19):1 656-1 658.
  • 9[4]MYERS M,ANKNEY R,MALPANI A,et al.FRC2560,X.509 Internet Public Key Infrastructure Online Certificate Status Protocol-OCSP[EB/OL].[2006-10-11].bttp://www.ietf.org/rfc/rfc2560.txt.
  • 10[5]GIRAULT M.Self-certified public keys[C]//Proc.of Advances in Cryptology-EUROCRYPT'91,Lecture Notes in Computer Science 547,Berlin:Springer-Verlag,1991:491-497.

共引文献3

同被引文献22

  • 1李红达,徐海霞,李宝,冯登国.NP问题的常数轮知识的零知识证明系统[J].中国科学:信息科学,2010,40(9):1197-1210. 被引量:1
  • 2侯整风,韩江洪.一种基于RSA签名的多KAC公钥认证模式[J].计算机应用与软件,2004,21(12):4-5. 被引量:2
  • 3王茜,倪建伟.一种基于RSA的加密算法[J].重庆大学学报(自然科学版),2005,28(1):68-72. 被引量:14
  • 4张虎强,洪佩琳,李津生,熊继平.一种零知识证明协议的安全分析与改进[J].信息安全与通信保密,2006,28(11):163-166. 被引量:4
  • 5Li Jiguo, Wang Shuhong. New Efficient Proxy Blind Signature Scheme Using Verifiable Self-certified Public Key[J]. International Journal of Network Security, 2007, 4(2): 193-200.
  • 6Byoungcheon L. Self-certificate: PKI Using Self-certified Key[C]// Proc. of IEEE Int'l Conf. on Information Security and Cryptology. [S. l.]: IEEE Press, 2000.
  • 7Schnorr C R Efficient Signature Generation by Smart Cards[J]. Journal of Cryptology International Association for Cryptologic Research, 1991, 4(3): 161-174.
  • 8Girault M. Self-certified Public Keys[C]//Proc. of EURO- CRYPT'91. [S. l.]: Springer-Verlag, 1991.
  • 9Holger P. Self-certified Keys Concepts and Applications[C]// Proc. of the 3rd Int'l Conf. on Communications and Multimedia Security. [S. l.]: IEEE Press, 1997.
  • 10Kim S. Verifiable Self-certified Public Key[C]//Proc. of WCC'99. Paris, France: [s. n.], 1999.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部