期刊文献+

一种新的基于身份的认证密钥协商协议 被引量:7

New Identity-based Authenticated Key Agreement Protocol
下载PDF
导出
摘要 设计一种能够提供PKG前向安全的基于身份的认证密钥协商协议,在标准模型中证明其具有已知密钥安全、完美前向安全、抗密钥泄露伪装攻击等安全特性。该协议的安全性建立在BDDH假设的基础上,与安全性建立在其他困难问题基础上的同类协议相比,其运算效率相当,安全性更高。 This paper designs an identity-based authenticated key agreement protocol with perfect forward security of Private Key Generator(PKG).It is proved to provide known key security,forward secrecy,key-compromise impersonation and so on in standard model.Its security is based on Bilinear Decisional Diffie-Hellman(BDDH) assumption,so its security is higher than the protocols based on the weaker assumption.
作者 丁辉 殷新春
出处 《计算机工程》 CAS CSCD 北大核心 2010年第23期127-129,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2007AA0124487)
关键词 认证密钥协商协议 基于身份的加密方案 双线性对 标准模型 authenticated key agreement protocol Identity-Based Encryption(IBE) scheme bilinear pairings standard model
  • 相关文献

参考文献8

  • 1Boneh D, Franklin M Identity-based Encryption from the Weil Pairing[C]//Proc. of CRYPTO ' 01. Berlin, Germany: Springer-Verlag, 2001.
  • 2Smart N. An ID-based Authenticated Key Agreement Protocol Based on the Well Pairing [J]. Electronic Letters, 2002, 38(13) : 630-632.
  • 3王圣宝,曹珍富,董晓蕾.标准模型下可证安全的身份基认证密钥协商协议[J].计算机学报,2007,30(10):1842-1852. 被引量:42
  • 4Gentry C. Practical Identity-based Encryption Without Random Oracles[C]//Proc. of EUROCRYPT' 06. Berlin, Germany: Springer-Verlag, 2006.
  • 5Xu Peng, Cui Guohua. An Efficient and Provably Secure IBE Scheme with Short System Parameters[C]//Proc. of the 4th International Conference on Wireless Communications, Networking and Mobile Computing. Dalian, China: [s. n. ], 2008.
  • 6Chen Liqun, Cheng Zhaohui, Smart N P. Identity based Key Agreement Protocols from Pairings[J]. International Journal of Information Security, 2006, 6(4): 213-241.
  • 7McCullagh N, Paulo S L, Barreto M. A New Two-party Identity-based Authenticated Key Agreement [C]//Proc. of CTRSA'05. Berlin, Germany: Springer-Verlag, 2005.
  • 8苏仁旺.基于身份的认证密钥协商协议密码分析[J].计算机工程,2008,34(8):172-173. 被引量:4

二级参考文献31

  • 1Blake-Wilson S,Menezes A.Authenticated Diffie-Hellman key agreement protocols//Proceedings of the SAC' 98,Lecture Notes in Computer Science 1556.Berlin:Springer-Verlag,1999:339-361.
  • 2Diffie W,Hellman M E.New directions in cryptography.IEEE Transactions on Information Theory,1976,22 (6):644-654.
  • 3Shamir A.Identity-based cryptosystems and signature schemes//Proceedings of the CRYPTO'84,Lecture Notes in Computer Science 196.Berlin:Springer-Verlag,1984:47-53.
  • 4McCullagh N,Barreto P S L M.A new two-party identitybased authenticated key agreement//Proceedings of the CTRSA'05,Lecture Notes in Computer Science 3376.Berlin:Springer-Verlag,2005:262-274.
  • 5Boneh D,Franklin M.Identity-based encryption from the Weil pairing//Proceedings of the CRYPTO' 01,Lecture Notes in Computer Science 2139.Berlin:Springer-Verlag,2001:213-229.
  • 6ElGamal T.A public key cryptosystem and signature scheme based on discrete logarithms.IEEE Transaction on Information Theory,1985,31(4):469-472.
  • 7Smart N.An ID-based authenticated key agreement protocol based on the Weil pairing.Electronic Letters,2002,38(13):630-632.
  • 8Shim K.Efficient ID-based authenticated key agreement protocol based on Weil pairing.Electronic Letters,2003,39(8):653-654.
  • 9Chen L,Kudla C.Identity based key agreement protocols from pairings//Proceedings of the 16th IEEE Computer Security Foundations Workshop.Los Alamitos,California:IEEE Computer Society,2002:219-213.
  • 10Ryu E K,Yoon E J,Yoo K Y.An efficient ID-based authenticated key agreement protocol from pairings//Proceedings of the NETWORKING'04,Lecture Notes in Computer Science 3042.Berlin:Springer-Verlag,2004:1458-1463.

共引文献44

同被引文献62

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 2王东安,张方舟,秦刚,南凯,阎保平.无线传感器网络安全协议的研究[J].计算机工程,2005,31(21):10-13. 被引量:12
  • 3YANG Geng,RONG Chun-ming,VEIGNER Christian,WANG Jiang-tao,CHENG Hong-bing.Identity-based key agreement and encryption for wireless sensor networks[J].The Journal of China Universities of Posts and Telecommunications,2006,13(4):54-60. 被引量:10
  • 4Shamir A.Identity-based Cryptosystems and SignatureSchemes[C]//Proc.of CRYPTO’84.Berlin,Germany:Springer-Verlag,1984:47-53.
  • 5Smart N P.ID-based Authenticated Key Agreement Protocol Basedon the Weil Pairings[J].Electronic Letters,2002,38(13):630-632.
  • 6Blake-Wilson S,Johnson C,Menezes A.Key Agreement Protocolsand Their Security Analysis[C]//Proc.of the 6th IMA InternationalConference on Cryptography and Coding.Berlin,Germany:Springer-Verlag,1997:30-45.
  • 7Chen Liqun,Kulda C.Identity-based Authenticated KeyAgreement Protocols from Pairing[C]//Proc.of the 16th IEEEComputer Security Foundations Workshop.[S.l.]:IEEE Press,2002:219-233.
  • 8Chen Liqun,Cheng Zhaohui,Smart N.Identity-based KeyAgreement Protocols from Pairings[J].International Journal ofInformation Security,2007,6(4):213-241.
  • 9Kudla C,Paterson K.Modular Security Proofs for Key AgreementProtocols[C]//Proc.of ASIACRYPT’05.Berlin,Germany:Springer-Verlag,2005:549-565.
  • 10McCullagh N,Paulo S,Barreto M.A New Two-party Identity-based Authenticated Key Agreement[C]//Proc.of CT-RSA’05.Berlin,Germany:Springer-Verlag,2005.

引证文献7

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部