期刊文献+

SAKI方案的分析及改进 被引量:2

Analysis and Improvement of Separable and Anonymous Identity-based Private Key Issuing Scheme
下载PDF
导出
摘要 SAKI方案可以有效解决基于身份的密码体制中用户如何向私钥产生中心证明自己的身份并安全得到其产生的用户私钥这2个问题,但其存在安全缺陷。针对上述情况,提出改进的方案。对比分析结果证明,改进的方案在保留SAKI方案简单、高效等优点的同时,可以抵抗口令的字典攻击、偷取认证攻击、中间人攻击和私钥申请报文完整性攻击。 Separable and Anonymous identity-based Key Issuing(SAKI) scheme can solve the problems that how to authenticate the user's identity and distribute the user's private key in identity-based cryptography,but it has secure flaws.This paper investigates the secure flaws of SAKI scheme and proposes an improved scheme.Comparison analysis result shows that the improved scheme keeps simplicity and high efficiency of SAKI,and can resist keyword dictionary attack,stolen verifier attack,man-in-middle attack and privacy key integrality attack.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第23期116-118,共3页 Computer Engineering
关键词 基于身份 SAKI方案 双线性对 超奇异椭圆曲线 identity-based Separable and Anonymous identity-based Key Issuing(SAKI) scheme bilinear pairing supersingular elliptic curve
  • 相关文献

参考文献5

二级参考文献18

  • 1杨少春,郎为民.基于身份和双线性对的代理环签名方案[J].微计算机信息,2006,22(04X):79-81. 被引量:12
  • 2李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 3刘春刚,周廷显.一种新的有效签密方案的研究[J].南京理工大学学报,2006,30(6):739-741. 被引量:4
  • 4Stallings W.Cryptography and Network Seeurity[M].4th ed.[S.l.]:Prentice Hall,2006.
  • 5Shamir A.Identity-based Cryptosystems and Signature Schemes[C]//Proc.of Advances in CRYPTO'85.Santa Barbara,California,USA:Springer-verlag,1984:47-53.
  • 6Goyal V. Reducing Trust in the PKG in Identity-based Cryptoystems[C]//Proc.of CRYPTO'07.Santa Barbara,California,USA:Spfinge-Veflag.2007:430-447.
  • 7Boneh D,Franklin M.Identity-based Encryption from the Weil Pairing[C]//Proc.of Advances in CRYPTO'01.Santa Barbara,California,USA:Spnnger-Verlag,2001:213-229.
  • 8Cha J C,Cheon J H.An Identity-based Signature from Cap Diffie-Hellman Groups[C]//Proc.of PKC'03.Miami,FL,USA:Springer-Verlag,2003:18-30.
  • 9Zheng Yuliang. Digital Signcryption or How to Achive Cost (Signature & Encryption)<<Cost(Signature)+Cost(Encryption)[C]// Proc. of CRYPTO'97. Berlin, Germany: Springer-Verlag, 1997: 165-179.
  • 10Shamir A. Identity-based Cryptosystems and Signature Schemes[C]// Proc. of CRYPTO'84. Berlin, Germany: Springer-Verlag, 1984: 47-53.

共引文献11

同被引文献24

  • 1刘淳,张凤元,张其善.基于智能卡的RSA与ECC算法的比较与实现[J].计算机工程与应用,2007,43(4):96-98. 被引量:10
  • 2Xun Yi. Efficient ID-based Key Agreement from Weil Pairing[J]. Electronics Letters, 2003, 39(13): 206-208.
  • 3Boyd C, Mao W, Paterson K. Deniable Authenticated Key as Abolishment for Internet Protocols[C]//Proceedings of Workshop on Security Protocols. Heidelberg, Germany: Springer-Verlag, 2003: 255-271.
  • 4Shoup V. Sequences of Games: A Tool for Taming Complexity in Security Proofs[EB/OL]. (2004-10-20). http://eprint.iacr. org/2004/ 332.pdf.
  • 5Chien Hung-Yu. Identity-based Key Agreement Protocol for Mobile Ad Hoc Networks Using Bilinear Pairing[C]//Proceedings of IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. Washington D. C., USA: IEEE Press, 2000: 520-529.
  • 6Wan Zhiguo, Ren Kui, Lou Wenjing, et al. Anonymous Id-based Group Key Agreement for Wireless Networks[C]//Proceedings of Wireless Communications and Networking Conference. Las Vegas, USA: IEEE Press, 2008: 2615-2620.
  • 7Tlomas N, Jamas MD. Normal and abmormal consequences of apoptosis in the human heart. Circulation, 1994, 90(1):560-567
  • 8Wilson S,Colucci MD.Apoptosis in the heart. The New England Journal of Medicine, 1996,335(16): 1224 - 1231
  • 9Henke A, Mohr C, Sprenger H, et al. Coxsackie virus B3-induced production of tumor necrosis factor-a, IL-1β and IL-6 in human monocytes. Jimmunol, 1992,148(7) :2270 - 2279
  • 10Smith SC, Allen PM. Neutraljation of endogenous tumor necrosis factor ameliorates the severity of myosin-induced myocarditis.Circ Res, 1992,70(4) :856 - 861

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部