期刊文献+

无双线性对的无证书两方密钥协商方案 被引量:4

Certificateless two-party key agreement scheme without bilinear pairing
下载PDF
导出
摘要 近几年来,有许多无证书密钥协商方案相继被提出,它们都需要双线性对运算,而且它们中大部分不能抵抗密钥泄露伪装攻击和临时私钥泄露产生的攻击。2009年,Lippold等人提出一个可证安全无证书密钥协商协议,但该协议需要较大计算量。为了解决上述问题,给出了一个新的无双线性对运算无证书两方密钥协商方案,并分析了它的安全属性,只要每方至少有一个未泄露的秘密,那么新方案就是安全的。因此,即使密钥生成中心知道双方的临时私钥,新方案也是安全的。与Lippold等人的协议相比,新方案降低了计算复杂度。 A few of certificateless key agreement schemes have been proposed in recent years,all of them need pairing operations,what's more,most of them are vulnerable to the key compromise impersonation attack and resistance to leakage of ephemeral keys.The provably secure certificateless key agreement protocol was proposed by Lippold in 2009,but their protocol suffered from computation burden.In order to solve the above-mentioned problem,this paper proposed a new pairing-free certificateless two party key agreement scheme (CL-KA) and presened its security properties.The new scheme was secure as long as each party had at least one uncompromised secret.Thus,the new scheme was secure even if the key generation centre learned the ephemeral secrets of both parties.The new scheme achieves efficiency in computational cost when compared with Lippold's protocol.
出处 《计算机应用研究》 CSCD 北大核心 2010年第11期4287-4289,4292,共4页 Application Research of Computers
基金 国家"863"计划资助项目(2009AA01Z415)
关键词 密钥协商 两方 无证书密码学 无双线性对 key agreement two party certificateless cryptography pairing-free
  • 相关文献

参考文献4

二级参考文献30

  • 1Blake-Wilson S,,Menezes A.Authenticated Diffie-Hellman Key Agreement Protocols[].Proceeding of SAC’.1999
  • 2Al-Riyami S S,Paterson K G.Certificateless Public Key Cryptography[].Proceeding of ASIACRYPT’.2003
  • 3Al-Riyami S S,Paterson K G.Certificateless Public Key Cryptography. http://www.eprint.iacr. org . 2003
  • 4Mandt T K,Tan C H.Certificateless Authenticated Two-Party Key Agreement Protocols[].Proceeding of ASIAN’.2008
  • 5Boneh D,Franklin M.Identity-Based Encryption from the Weil Pairing[].Proceeding of CRYPTO’.2001
  • 6Blake-Wilson S,Johnson C,Menezes A.Key Agreement Protocols and Their Security Analysis[].Proceeding of the sixth IMA International Conference on Cryptography and Coding.1997
  • 7Menezes A J,van Oorschot P C,Vanstone S A.Handbook of Applied Cryptography[]..1997
  • 8Chen L,Kudla C.Identity Based Key Agreement Protocols from Pairings[].Proceeding of the th IEEE Computer Security Foundations Workshop.2002
  • 9Diffie W,Hellman M E.New Directions in Cryptography[].IEEE Transactions on Information Theory.1976
  • 10Mitchell C,Ward M,Wilson P.Key Control in Key Agreement Protocols[].Electronics Letters.1998

共引文献35

同被引文献38

  • 1SHAOZu-hua.Efficient Authenticated Key Agreement Protocol Using Self-Certified Public Keys from Pairings[J].Wuhan University Journal of Natural Sciences,2005,10(1):267-270. 被引量:12
  • 2赵华伟,李大兴.密钥交换协议的安全性分析[J].山东大学学报(理学版),2006,41(4):101-106. 被引量:6
  • 3WANG Shengbao,CAO Zhenfu,WANG Licheng.Efficient Certificateless Authenticated Key Agreement Protocol from Pairings[J].Wuhan University Journal of Natural Sciences,2006,11(5):1278-1282. 被引量:24
  • 4SHI Yijuan LI Jianhua.Two-Party Authenticated Key Agreement in Certificateless Public Key Cryptography[J].Wuhan University Journal of Natural Sciences,2007,12(1):71-74. 被引量:23
  • 5AI-Riyami S, Paterson K.Certificateless public key cryptography[C]// Lecture Notes in Computer Science 2894: Proceedings of the Asiacrypt 2003.Taipei, Taiwan, China: Springer-Verlag, 2003: 452-473.
  • 6Mandt T, Chik H.Certicateless authenticated two-party key agreement protocols[C]//Lecture Notes in Computer Science 4435: Proceedings of the ASIAN 2006.Tokyo, Japan: Springer-Verlag, 2006: 37-44,.
  • 7Xia L, Wang S B, Shen J.Breaking and repairing the certificateless key agreement protocol from ASIAN 2006[J].Wuhan University Journal of Natural Science, 2006,13 (5) : 562-566.
  • 8Cao M, Zhang F T.Key-compromise impersonation attacks on some certificateless key agreement protocols and two improved protocols[C]//Proceedings of the First International Workshop on Education Technology and Computer Science 2009.Cam- bridge:IEEE Computer Society,2009:62-66.
  • 9Wang F J, Zhang Y Q.A new provably secure authentication and key agreement mechanism for SIP using certificateless pub- lic-key cryptography[EB/OL]. (2007) .http://eprint.iacr.org/.
  • 10Swanson C D J.A study of two-party certificateless authenticated key-agreement protocols[C]//Lecture Notes in Computer Science 5922:Proceedings of INDOCRYPT 2009.Newdelhi,India:Springer- Verlag, 2009: 57-71.

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部