期刊文献+

有效的强安全组群密钥交换协议 被引量:1

Efficient group key exchange protocol with strong security
下载PDF
导出
摘要 组合公钥密码(CPK)体制无需证书来保证公钥的真实性,克服了用户私钥完全由密钥管理中心生成的问题。基于CPK设计了一个常数轮的组群密钥交换协议,该协议在CDH假设下可证安全并具有完美的前向安全性,只需两轮通信即可协商一个组群会话密钥,在通信和计算方面都很高效;并且高效地支持组群成员动态加入/离开,尤其对于多成员加入/离开的情况,只需额外的少量通信和计算即可更新组群密钥,确保了前向保密性和后向保密性。此外,本协议提供了强安全性保证,它能保持密钥的秘密性,除非某一方的临时私钥和长期私钥同时被泄露。最后,该协议提供了一个设计常数轮强安全组群密钥交换协议的方法,大部分的秘密共享体制均可直接应用于该协议。 Combined Public Key(CPK) cryptography does not need certificates to guarantee the authenticity of public keys,and avoids the problem that user's private key completely depends on the Key Management Center(KMC).Based on CPK,a constant-round group key exchange protocol was presented,which was provably secure under the intractability of computation Diffie-Hellman problem and achieved perfect forward secrecy.The protocol has only two communication rounds and it is more efficient than other protocols both in communication and computation.It supports group member join/leave operations efficiently and only needs minimum amount of computation and communication to renew the group key especially for multiple joins/leaves.At the same time,it also assures backward secrecy and forward secrecy.Moreover,the protocol achieves strong security.It can keep the session key secret from the adversary except that one party's ephemeral private key and static private key are all revealed to the adversary.Lastly,the protocol provides a method to design efficient constant-round group key exchange protocols with strong security and most secret sharing schemes can be adopted to construct the protocol.
出处 《计算机应用》 CSCD 北大核心 2010年第7期1805-1808,共4页 journal of Computer Applications
基金 通信技术重点实验室基金资助项目(9140C1103040902)
关键词 组群密钥交换 组合公钥密码 强安全性 秘密共享 动态组群 group key exchange Combined Public Key Cryptography(CPK) strong security secret sharing dynamic group
  • 相关文献

参考文献14

  • 1AL-RIYAMI S,PATERSON K.Certificateless public key cryptography[C] // Proceedings of Asiacrypt'03.Berlin:Springer-Verleg,2003:205-217.
  • 2JOSEPH K L,MAN H A,WILLY S.Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model[C] // Proceedings of the 2nd ACM Symposium on Information,Computer and Communications Security.New York:ACM,2007:273-283.
  • 3唐文,南相浩,陈钟.基于椭圆曲线密码系统的组合公钥技术[J].计算机工程与应用,2003,39(21):1-3. 被引量:25
  • 4BARUA R,DUTTA R,SARKAR P.Extending Joux's protocol to multi-party key exchange[C] // Proceedings of Indocrypt'03.Berlin:Springer-Verlag,2003:205-217.
  • 5宋震,周贤伟,窦文华.一种基于身份标识的MANET组密钥协商协议[J].电子学报,2008,36(10):1862-1868. 被引量:6
  • 6CAO Chunjie,MA Jianfeng,MOON Sangjae.Provable Efficient Certificateless Group Key Exchange Protocol[J].Wuhan University Journal of Natural Sciences,2007,12(1):41-45. 被引量:8
  • 7邓少锋,邓帆,李益发.基于CPK的可证安全组群密钥交换协议[J].信息安全与通信保密,2009(8):316-319. 被引量:1
  • 8KRAWCZYK H.HMQV:A high-performance secure Diffie-Hellman protocol[C] // Proceedings of CRYPTO 2005.Berlin:Springer-Verlag,2005:546-566.
  • 9LAMACCHIA K,LAUTER K,MITYAGIN A.Stronger security of authenticated key exchange[C] // Proceedings of ProvSec 2007.Berlin:Springer-Verlag,2007:1-16.
  • 10BRESSEN E,MANULIS M.Securing group key exchange against strong corruptions[C] // Proceedings of ASIACCS'08.New York:ACM,2008:249-260.

二级参考文献32

  • 1CAO Chunjie,MA Jianfeng,MOON Sangjae.Provable Efficient Certificateless Group Key Exchange Protocol[J].Wuhan University Journal of Natural Sciences,2007,12(1):41-45. 被引量:8
  • 2张金颖,邓子健.基于身份的密钥协商方案[J].信息安全与通信保密,2007,29(3):102-104. 被引量:6
  • 3郑晓丽,姜迪刚.基于单向函数树的多播密钥安全性分析[J].信息安全与通信保密,2007,29(5):127-128. 被引量:4
  • 4南相浩 唐文 余嘉宁.ECC组合公钥[A]..中国计算机学会信息保密专业委员会论文集:第11卷[C].,2001-09..
  • 5Debby M Wallner, Eric J Harder, Ryan C Agee. Key Management for Multicast: Issues and Architectures [S ]. RP-L2627, 1999.
  • 6Yongdae Kim, Adrian Perrig, Gene Tsudik. Communication-efficient group key agreement[A] .Proceedings of the 17th International Information Security Conference IFIP SEC. 01 [ C ], 2001.229 - 244.
  • 7Adi Shamir. Identity-based cryptosystems and signature schemes [A]. Advances in cryptology-Proceedings of CRYPTO' 84 [C]. vol. 196 of Lecture Notes in Computer Science, Springer- Verlag, 1984.47 - 53.
  • 8Rekesh Babu Bobba, Laurent Eschenauer, Virgil Gligor, William Arbaugh. Bootstrapping Security Associations for Routing in Mobile Ad-Hoc Networks[R]. Technical Report 2002 - 44, University of Maryland, 2002.
  • 9Yair Amir, Giuseppe Ateniese, Damian Hasse, Yongdae Kim, Cristina Nita-Rotaru, TheoSchlossnagle, John Schultz, Jonathan Stanton, Gene Tsudik. Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments [A].Proceedings of the 20th IEEE International Conference on Distributed Computing Systems (ICDCS 2000)[C].2000. 330 - 343.
  • 10David Pointcheval, Jacques Stem. Security arguments for digital signatures and blind signatures [J]. Journal of Cryptology: the journal of the International Association for Cryptologic Research, 2000,13(3) :361 - 396.

共引文献35

同被引文献14

  • 1Diffie W, Hellman M.New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976,22(6):644-654.
  • 2Joux A.A one-round protocol for tripartite Diffie-Hellman[C]// LNCS 1838: Proceedings of the 4th International Algorith- mic Number Theory Symposium(ANTS-IV).Berlin:Springer- Verlag, 2000 : 385-394.
  • 3Sherman A, McGrew D.Key establishment in large dynamic groups using one-way function trees[J].IEEE Trans on Soft- ware Engineering, 2003,29 ( 5 ) : 444-458.
  • 4Kim Y, Perrig A, Tsudik G.Simple and fault-tolerant key agreement for dynamic collaborative groups[C]//Proceedings of 7th ACM Conference on Computer and Communication Security, 2000 : 235-244.
  • 5Chen L,Kudla C,Identity based authenticated key agreement protocols from pairings[C]//Proc of the 16th IEEE Computer Security Foundations Workshop,2003:21%233.
  • 6Xie G.An 1D-based key agreement scheme from pairing[EB/OL], ( 2011-04-20) .http ://eprint.iacr.org/2005/093 .pdf.
  • 7Barua R, Dutta R, Skrkar P.Extending Joux's protocol to multiparty key exchange[C]//Proceedings of Indocrypt 2003. Berlin: Springer-Verlag, 2003 : 205-217.
  • 8Dutta R,Barua R.Constant round dynamic group key agree- ment[C]//LNCS 3650: Proceedings of ISC 2005.Berlin: Springer- Verlag, 2005 : 74-88.
  • 9Yacobi Y, Shmuely Z.On key distribution systems[C]//Crypto 1989.Berlin: Springer, 1989,435 : 344-355.
  • 10Yacobi Y.A key distribution "paradox"[C]//Crypto 1990.Ber- lin: Springer, 1990, 537: 268-273.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部