期刊文献+

一个前向安全的基于签密的密钥协商协议

Forward secure key agreement protocol based on signcryption
下载PDF
导出
摘要 安全有效地传递信息是计算机安全通信研究领域的主要目标。借鉴Zheng和张串绒将签密技术运用到密钥协商协议中的思想,利用基于身份的签密方案,提出一种具有前向安全性的密钥协商协议。该协议在具有基于身份的公钥密码体制特点的同时,又拥有签密技术的优点。与已有的方案相比,该密钥协商协议除了具有机密性、认证性、还具有前向安全性的特点。 Secure and efficient message delivery is one of the major aims of computer and communication security research. Based on the key agreement protocols using signcryption proposed by Zheng and Zhang chuan-rong, this paper proposed a forward secure key agreement protocol based on identity-signcyption. It combined the advantages of the identity-based public key system and signcryption technique. As compared to the existing schemes, the protocol is not only confidential, authenticated, but also forward secure.
出处 《计算机应用研究》 CSCD 北大核心 2010年第5期1871-1872,共2页 Application Research of Computers
基金 国家自然科学基金资助项目(60873233)
关键词 签密 基于身份的公钥系统 双线性对 前向安全 密钥协商 signcryption identity-based public key cryptosystem bilinear pairing forward secure key agreement
  • 相关文献

参考文献7

  • 1ZHENG Y.Digital signcryption or how to achieve cost (signature & encryption 《《 cost (signature) +cost (encryption)[C]// Proc of Advances in Cryptology-CRYPTO'97,Lecture Notes in Computer Science.Berlin:Springer-Verlag,1997:165-179.
  • 2SHAMIR A.Identity-based cryptosystems and signature schemes[C]// Proc of Advances in Cryptology-CRYPTO'84,Lecture Notes in Computer Science.Berlin:Springer-Verlag,1984:47-53.
  • 3MALONE-LEE J.2002/098,IACR,Identity based signcryption[M].Berlin:Springer,2002:362-379.
  • 4ZHENG Y,IMAI H.Compact and unforgeable key establishment over an ATM network[C]// Proc of IEEE INFOCOM'98.San Francisco,CA:[s.n],1998:411-418.
  • 5张串绒,肖国镇.基于签密技术的可认证密钥协商协议[J].空军工程大学学报(自然科学版),2006,7(6):65-67. 被引量:4
  • 6BONEH D,FRANKLIN M.Identity-based encryption from the Weil pairing[C]// Proc of Advances in Cryptology 2001.Lecture Notes in Computer Science.Berlin:Springer-Verlag,2001:213-229.
  • 7LIBERT B,QUISQUATER J-J.New identity based signcryption schemes from pairings[C]// Proc of IEEE Information Theory Workshop.Paris:[s.n],2003:155-158.

二级参考文献5

  • 1Zheng Y,Imai H.Compact and Unforgeable Key Establishment over an ATM Network[A].Proceedings of IEEE Ineocom[C].San Francisco:1998.
  • 2Tor E Bjrstad,Alexander W.Dent.Building Better Signcryption Schemes with Tag-KEMs[A].Appear in the 9th International Workshop on Practice and Theory[C].2006.
  • 3Shamir A.Identity-based Cryptosystems and Signature Schemes[A].Advances in Cryptology,Crypto84[C].1984.
  • 4Boneh D,Franklin M.Identity Based Encryption From the Weil Pairing[A].Advances in Cryptology-Crypto01,LNCS 2139[C].Springer:2001.
  • 5Joux A.A one Round Protocol for Tripartite Diffie-Hellman[A].Algorithmic Number Theory Symposium,ANTS-Ⅳ[C].2000.

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部