期刊文献+

基于身份可证安全的双方密钥协商协议 被引量:5

Identity-based security provable two parties authentication and key agreement
下载PDF
导出
摘要 针对双方认证和密钥协商协议中会话双方属于不同密钥产生中心的情况,利用双线性对性质和BDH假设,基于可证安全的eCK模型提出一种基于身份可证安全的双方密钥协商协议。该协议从测试会话在随机谕示模型中是否存在相应的匹配会话两个方面,对提出的协议方案进行了安全性证明:若BDH假设不可解,则本方案是安全的认证密钥协商协议。 Based on the extended Canetti-Krawczyk (eCK) model and the bilinear pairing and BDH assumption, the paper proposed an identity-based security provable authentication and key agreement scheme. This scheme could be applied in the situation that two session parties belong to different private key generators respectively. Moreover, proved the scheme to be secure in the random oracle model from two sides : if matching session of the test session exists or not. The demonstration finally shows the proposed scheme is secure if the BDH assumption is intractable.
出处 《计算机应用研究》 CSCD 北大核心 2009年第9期3519-3522,共4页 Application Research of Computers
基金 国家"863"计划资助项目(2007AA01Z434)
关键词 认证密钥协商 基于身份 BDH假设 可证安全 authentication and key agreement identity-based BDH assumption security provable
  • 相关文献

参考文献7

  • 1SHAMIR A. Identity-based cryptosystems and signature schemes [ C]//Proc of Advances in Cryptology-CRYPTO' 84. Santa Barbara: Springer-Verlag, 1984:47-53.
  • 2BONEH D, FRANKLIN M. Identity-based encryption from the Well pairing[ C ]//Proc of Advances in Cryptology-CRYPTO 2001. Santa Barbara: Springer-Verlag, 2001:213- 229.
  • 3SMART N P. An identity-based authenticated key agreement protocol based on the Weil pairing [ J ]. Electronic Letters, 2002,38 : 630- 632.
  • 4CHEN Li-qun, KUDLA C. Identity-based authenticated key agreement protocols from pairings [ C ]// Proc of IEEE Computer Security Foundations Workshop. [ S. l. ] : IEEE Computer Society, 2003 : 219-233.
  • 5SHIM K. Efficient ID-based authenticated key agreement protocol based on the Weil pairing [ J ]. Electronic Letters, 2003,39 ( 8 ) : 653-654.
  • 6LaMACCHIA B, LAUTER K, MITYAGIN A. Stronger security of authenticated key exchange [ EB/OL ]. http://eprint, iacr. org/2006/ 073.
  • 7USTAOGLU B. Obtaining a secure and efficient key agreement protocol from (H) MQV and NAXOS [ J ]. Desgns, Codesand Cryptography, 2007, 46 (3) :329- 342.

同被引文献64

  • 1彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 2Bellare M, Rogaway P. Entity authentication and key distribution[C ]//Proceeding of CRYPTO 1993 (LNCS 773), Berlin:Springer-Verlag, 1994:232-249.
  • 3Blake W S, Johason D, Menezes A. Key agreement protocols and their security analysis[C]//Proceeding of the 6th IMA International Conference on Cryptog raphy and Coding, (LNCS 1355), Berlin: Springer- Verlag, 1997 : 30-45.
  • 4Bellare M, Canetti R, Krawczyk H. A modular approach to the design and analysis of authentication and key exchange protocols[ C]/ / Proceeding of 30th ACM STOC, New York: ACM Press, 1998:419-428.
  • 5Canetti R, Krawczyk H. Analysis of key-exchange protocols and their use for building secure channels [C]//Proceeding of EUROCRYPT 2001 (LNCS 2045 ), Berlin : Springer-Verlag, 2001 : 453-474.
  • 6Krawczyk H. HMQV:A high-performance secure Dif fie-Hellman protocol[C]//Proceeding of CRYPTO 2005 (LNCS 3621 ), Berlin:Springer-Verlag, 2005 : 546-566.
  • 7LaMacchia B, Lauter K, Mityagin A. Stronger security of authenticated key exchange[C]//Proceeding of ProvSec 2007 (LNCS 4784), Berlin:Springer-Verlag, 2007:1-16.
  • 8Ustaoglu B. Obtaining a secure and efficient key agreement protocol from (H) MQV and NAXOS[J]. Designs, Codes and Cryptography, 2008, 46 (3) : 329- 342.
  • 9Lee J, Park J H. Authenticated key exchange secure under the computational Diffie-Hellman assumption [EB/OL]. [2009 01-12]. http://eprint, iacr. org/2008/ 344. pd f .
  • 10Lee J, Park C S. An efficient authenticated key exchange protocol with a tight security reduction[EB/ OL]. [2009-01-12]. http://eprint, iacr. org/2008/ 345. pd f .

引证文献5

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部