期刊文献+

基于身份认证密钥协商的分析与改进 被引量:1

Analysis and improvement of identity-based authenticated key agreement
下载PDF
导出
摘要 针对标准模型下可证明安全的基于身份认证密钥协商协议给出了一种有效攻击,指出其无会话密钥托管的协议存在安全缺陷.当密钥生成器(PKG)被恶意控制时,协商的会话密钥仍能被计算出来.为了抵抗这种攻击,给出了一种改进的基于身份认证密钥协商协议.改进的协议在标准模型下是可证明安全的,具有无会话密钥托管的属性. The security of a provably secure identity-based authenticated key agreement protocol in the standard model was analyzed, and it was found that the protocol used in escrowless mode has security flaws. When the private key generator (PKG) is controlled or attacked, all of the session keys can be obtained. To resist this attack, the identity-based authenticated key agreement protocol was improved. This new protocol was proven to be secure in the standard model and has the property of not needing session key escrow.
出处 《哈尔滨工程大学学报》 EI CAS CSCD 北大核心 2009年第10期1194-1198,共5页 Journal of Harbin Engineering University
基金 国家自然科学基金资助项目(60673072 60803149) 国家"973"基础研究发展规划基金资助项目(2007CB311201)
关键词 公钥密码 基于身份的认证密钥协商 双线性对 标准模型 public key cryptography identity-based authenticated key agreement bilinear maps standard model
  • 相关文献

参考文献17

  • 1SHAMIR A. Identity-based cryptosystems and signature schemes[ C]//Advances in Cryptology CryptoS4. Berlin, 1984.
  • 2BONEH D, FRANKLIN M. Identity-based eneryption from the Weil pairings [ C ]// Advances in Cryptology Crypto2001. Berlin, 2001.
  • 3SMART N P. ID-based authenticated key agreement protocol based on the Weil pairings [ J ]. Electronic Letters, 2002, 38(13): 630-632.
  • 4SCOTT M. Authenticated ID-based key exchange and remote log-in with insecure token and PIN number [ EB/ OL ]. [ 2002-10-29 ]. http ://eprint. iacr. org/2002/164.
  • 5CHEN L, KUDLA C. Identity based authenticated key agreement from pairings [ J ]. Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2005,88 (10) :2762-2768.
  • 6SHIM K. Efficient ID-based authenticated key agreement protocol based on the Weil pairing [ J ]. lEE Electronics Letter, 2003, 39(8):653-654.
  • 7SUN H M, HSIEH B T. Security analysis of Shimg authenticated key agreement protocols from pairings [ EB/OL ]. [ 2003-06-11 ]. http ://eprint. iacr. org/2003/113.
  • 8McCULLAGH N , BARRETO P. A new two-party identity-based authenticated key agreement [ C ]//Topics in Cryptology-CT-RSA 2005. Berlin, 2005.
  • 9XIE G. Cryptanalysis of Noel McCullagh and Paulo S. L. M. Barreto's two-party identity-based key agreement[ EB/OL]. [ 2004-11-15 ]. http ://eprint. iacr. org/2004/308.
  • 10CHOO K. Revisit of McCullagh-Barreto two-party ID-based authenticated key agreement protocols [ EB/OL ]. [ 2004-12-01 ]. http ://eprint. iacr. org/2004/343.

二级参考文献26

  • 1Blake-Wilson S,Menezes A.Authenticated Diffie-Hellman key agreement protocols//Proceedings of the SAC' 98,Lecture Notes in Computer Science 1556.Berlin:Springer-Verlag,1999:339-361.
  • 2Diffie W,Hellman M E.New directions in cryptography.IEEE Transactions on Information Theory,1976,22 (6):644-654.
  • 3Shamir A.Identity-based cryptosystems and signature schemes//Proceedings of the CRYPTO'84,Lecture Notes in Computer Science 196.Berlin:Springer-Verlag,1984:47-53.
  • 4McCullagh N,Barreto P S L M.A new two-party identitybased authenticated key agreement//Proceedings of the CTRSA'05,Lecture Notes in Computer Science 3376.Berlin:Springer-Verlag,2005:262-274.
  • 5Boneh D,Franklin M.Identity-based encryption from the Weil pairing//Proceedings of the CRYPTO' 01,Lecture Notes in Computer Science 2139.Berlin:Springer-Verlag,2001:213-229.
  • 6ElGamal T.A public key cryptosystem and signature scheme based on discrete logarithms.IEEE Transaction on Information Theory,1985,31(4):469-472.
  • 7Smart N.An ID-based authenticated key agreement protocol based on the Weil pairing.Electronic Letters,2002,38(13):630-632.
  • 8Shim K.Efficient ID-based authenticated key agreement protocol based on Weil pairing.Electronic Letters,2003,39(8):653-654.
  • 9Chen L,Kudla C.Identity based key agreement protocols from pairings//Proceedings of the 16th IEEE Computer Security Foundations Workshop.Los Alamitos,California:IEEE Computer Society,2002:219-213.
  • 10Ryu E K,Yoon E J,Yoo K Y.An efficient ID-based authenticated key agreement protocol from pairings//Proceedings of the NETWORKING'04,Lecture Notes in Computer Science 3042.Berlin:Springer-Verlag,2004:1458-1463.

共引文献41

同被引文献9

  • 1DING Jintai, GOWER J E, SCHMIDT D S. Multivariate public key cryptosystems [ M ]. New York: Springer, 2006 : 2-3, 246-247.
  • 2BE3TALE L, FAUGERE J C, PERRET L. Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic [J]. Designs, Codes and Cryptography, 2013, 69(1) : 1-52.
  • 3GAO Shuhong, HEINDL R. Multivariate public key crypto- systems from diophantine equations[ J]. Designs, Codes and Cryptography, 2013, 67(1) : 1-18.
  • 4WOLF C, PRENEEL B. Equivalent keys in HFE, C* , and variations [ C ]//Progress in Cryptology-MYCRPT 2005. Ber- lin, 2005: 33-49.
  • 5BOUILLAGUET C, FOUQUE P A, VIBER A. Graph-theo- retic algorithms for the "isomorphism of polynomials" prob- lem [ C ]//Advances in Cryptology-EUROCRYPT 2013. Ber- lin, 2013i 211-227.
  • 6DING Jintai, CLOUGH C, ARAUJO R. Inverting square systems algebraically is exponential [ J ]. Finite Fields and Their Applications, 2014, 26: 32-48.
  • 7CAO Weiwei, HU Lei. Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH [ J ]. Designs, Codes and Cryptography, 2014, 73 (3) : 719-730.
  • 8万哲先.有限域上典型群的几何学[M].第2版.北京:科学出版社,2002:4-5.
  • 9YUAN Feng,SUN Ying,JIANG Jijun,ZHAO Shangwei,XU Shengwei.A Multivariate Public Key Cryptographic Scheme[J].China Communications,2014,11(12):120-124. 被引量:5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部